Sciweavers

1782 search results - page 329 / 357
» Learning in Parallel Universes
Sort
View
JUCS
2008
156views more  JUCS 2008»
13 years 7 months ago
Efficient k-out-of-n Oblivious Transfer Schemes
Abstract: Oblivious transfer is an important cryptographic protocol in various security applications. For example, in on-line transactions, a k-out-of-n oblivious transfer scheme a...
Cheng-Kang Chu, Wen-Guey Tzeng
IPM
2007
129views more  IPM 2007»
13 years 7 months ago
Examining the effectiveness of real-time query expansion
Interactive query expansion (IQE) (c.f. Efthimiadis, 1996) is a potentially useful technique to help searchers formulate improved query statements, and ultimately retrieve better ...
Ryen W. White, Gary Marchionini
ITPRO
2007
101views more  ITPRO 2007»
13 years 7 months ago
Beyond Search: Content Applications
Federation of Abstracting and Information Services presentation (“TheThomsonTransformation: Remaking a Global 500 Company,” http://www. nfais.org/TurnerNFAIS06.ppt). Now conten...
Stephen Buxton
JOT
2007
170views more  JOT 2007»
13 years 7 months ago
Enough of Processes - Lets do Practices
All modern software development processes try to help project teams conduct their work. While there are some important differences between them, the commonalities are far greater ...
Ivar Jacobson, Pan Wei Ng, Ian Spence
MANSCI
2007
198views more  MANSCI 2007»
13 years 7 months ago
Real Options in Technology Licensing
“Real options” is often viewed as a valuable managerial tool of flexibility and exploration in new technology investment. Real options theory has been criticized, however, due...
Arvids A. Ziedonis