Sciweavers

2421 search results - page 135 / 485
» Message from the Editor-in-Chief
Sort
View
AIED
2007
Springer
14 years 4 months ago
Profiling Student Interactions in Threaded Discussions with Speech Act Classifiers
On-line discussion is a popular form of web-based computer-mediated communication and is an important medium for distance education. Automatic tools for analyzing online discussion...
Sujith Ravi, Jihie Kim
ICALP
2007
Springer
14 years 4 months ago
Private Locally Decodable Codes
We consider the problem of constructing efficient locally decodable codes in the presence of a computationally bounded adversary. Assuming the existence of one-way functions, we c...
Rafail Ostrovsky, Omkant Pandey, Amit Sahai
IWSEC
2007
Springer
14 years 4 months ago
How to Find Many Collisions of 3-Pass HAVAL
The hash function HAVAL is an Australian extension of well known Merkle-Damg˚ard hash functions such as MD4 and MD5. It has three variants, 3-, 4- and 5-pass HAVAL. On 3-pass HAVA...
Kazuhiro Suzuki, Kaoru Kurosawa
INFOCOM
2006
IEEE
14 years 4 months ago
A Fast Content-Based Data Distribution Infrastructure
— We present Sieve – an infrastructure for fast content-based data distribution to interested users. The ability of Sieve to filter and forward high-bandwidth data streams ste...
Samrat Ganguly, Sudeept Bhatnagar, Akhilesh Saxena...
IEEECIT
2005
IEEE
14 years 4 months ago
Identity Based Threshold Proxy Signcryption Scheme
An identity based cryptosystem is a novel type of public cryptographic scheme in which the public keys of the users are their identities or strings derived from their identities. ...
Meng Wang, Zhijing Liu