Sciweavers

2421 search results - page 166 / 485
» Message from the Co-Chairs
Sort
View
PKC
2009
Springer
240views Cryptology» more  PKC 2009»
14 years 10 months ago
Distributed Public-Key Cryptography from Weak Secrets
Abstract.We introduce the notion of distributed password-based publickey cryptography, where a virtual high-entropy private key is implicitly dened as a concatenation of low-entrop...
Céline Chevalier, David Pointcheval, Michel...
KDD
2005
ACM
124views Data Mining» more  KDD 2005»
14 years 9 months ago
Scalable discovery of hidden emails from large folders
The popularity of email has triggered researchers to look for ways to help users better organize the enormous amount of information stored in their email folders. One challenge th...
Giuseppe Carenini, Raymond T. Ng, Xiaodong Zhou
KDD
2005
ACM
171views Data Mining» more  KDD 2005»
14 years 9 months ago
Deriving marketing intelligence from online discussion
Weblogs and message boards provide online forums for discussion that record the voice of the public. Woven into this mass of discussion is a wide range of opinion and commentary a...
Natalie S. Glance, Matthew Hurst, Kamal Nigam, Mat...
CHI
2007
ACM
14 years 9 months ago
Appropriation of a MMS-based comic creator: from system functionalities to resources for action
Technologies can be used ? or appropriated ? in different ways by different users, but how do the use patterns evolve, and how can design facilitate such evolution? This paper app...
Antti Salovaara
FM
2009
Springer
110views Formal Methods» more  FM 2009»
14 years 3 months ago
Reduced Execution Semantics of MPI: From Theory to Practice
Abstract: There is growing need to develop formal verification tools for Message Passing Interface (MPI) programs, to eliminate bugs such as deadlocks and local assertion violatio...
Sarvani S. Vakkalanka, Anh Vo, Ganesh Gopalakrishn...