Sciweavers

378 search results - page 35 / 76
» Isolating the benefits of respect
Sort
View
CTRSA
2009
Springer
106views Cryptology» more  CTRSA 2009»
13 years 11 months ago
Communication-Efficient Private Protocols for Longest Common Subsequence
We design communication efficient two-party and multi-party protocols for the longest common subsequence (LCS) and related problems. Our protocols achieve privacy with respect to p...
Matthew K. Franklin, Mark Gondree, Payman Mohassel
ESWS
2006
Springer
13 years 11 months ago
Using Semantics to Enhance the Blogging Experience
Blogging, as a subset of the web as a whole, can benefit greatly from the addition of semantic metadata. The result -- which we will call Semantic Blogging -- provides improved cap...
Knud Möller, Uldis Bojars, John G. Breslin
EWSA
2006
Springer
13 years 11 months ago
Component Deployment Evolution Driven by Architecture Patterns and Resource Requirements
Software architectures are often designed with respect to some architecture patterns, like the pipeline and peer-to-peer. These patterns are the guarantee of some quality attribute...
Didier Hoareau, Chouki Tibermacine
CCIA
2008
Springer
13 years 9 months ago
Privacy in Distributed Meeting Scheduling
Meetings are an important vehicle for human interaction. The Meeting Scheduling problem (MS) considers several agents, each holding a personal calendar, and a number of meetings wh...
Ismel Brito, Pedro Meseguer
ACL
2008
13 years 9 months ago
Inferring Activity Time in News through Event Modeling
Many applications in NLP, such as questionanswering and summarization, either require or would greatly benefit from the knowledge of when an event occurred. Creating an effective ...
Vladimir Eidelman