Sciweavers

766 search results - page 25 / 154
» How to Read a Signature
Sort
View
ACL
2006
13 years 9 months ago
Partially Specified Signatures: A Vehicle for Grammar Modularity
This work provides the essential foundations for modular construction of (typed) unification grammars for natural languages. Much of the information in such grammars is encoded in...
Yael Cohen-Sygal, Shuly Wintner
TCC
2005
Springer
176views Cryptology» more  TCC 2005»
14 years 1 months ago
How to Securely Outsource Cryptographic Computations
We address the problem of using untrusted (potentially malicious) cryptographic helpers. We provide a formal security definition for securely outsourcing computations from a comp...
Susan Hohenberger, Anna Lysyanskaya
CHI
2009
ACM
14 years 8 months ago
Remembrance of things tagged: how tagging effort affects tag production and human memory
We developed a low-effort interaction method called Click2Tag for social bookmarking. Information foraging theory predicts that the production of tags will increase as the effort ...
Raluca Budiu, Peter Pirolli, Lichan Hong
CCS
2011
ACM
12 years 7 months ago
How to tell if your cloud files are vulnerable to drive crashes
This paper presents a new challenge—verifying that a remote server is storing a file in a fault-tolerant manner, i.e., such that it can survive hard-drive failures. We describe...
Kevin D. Bowers, Marten van Dijk, Ari Juels, Alina...
HRI
2012
ACM
12 years 3 months ago
How to use non-linguistic utterances to convey emotion in child-robot interaction
Vocal affective displays are vital for achieving engaging and effective Human-Robot Interaction. The same can be said for linguistic interaction also, however, while emphasis ma...
Robin Read, Tony Belpaeme