Sciweavers

5718 search results - page 1047 / 1144
» Modeling Rule Precision
Sort
View
121
Voted
EUROCRYPT
1999
Springer
15 years 7 months ago
On the (Im)possibility of Basing Oblivious Transfer and Bit Commitment on Weakened Security Assumptions
We consider the problem of basing Oblivious Transfer (OT) and Bit Commitment (BC), with information theoretic security, on seemingly weaker primitives. We introduce a general model...
Ivan Damgård, Joe Kilian, Louis Salvail
132
Voted
CIKM
1994
Springer
15 years 6 months ago
Analytical Version Control Management in a Hypertext System
may be saved for later reuse of material, but also to preserve the historical perspective of work done [ha:92]. In particular, in distributed and collaborative hypertext systems, v...
Antonina Dattolo, Antonio Gisolfi
137
Voted
DSN
2009
IEEE
15 years 6 months ago
Efficient resource management on template-based web servers
The most commonly used request processing model in multithreaded web servers is thread-per-request, in which an individual thread is bound to serve each web request. However, with...
Eli Courtwright, Chuan Yue, Haining Wang
104
Voted
DAI
1995
Springer
15 years 6 months ago
A Formal View of Social Dependence Networks
In response to the problems that have arisen regarding the terminology and concepts of agent-oriented systems, previous work has described a formal framework for understanding agen...
Mark d'Inverno, Michael Luck
106
Voted
AAAI
2008
15 years 5 months ago
Extracting Relevant Snippets for Web Navigation
Search engines present fix-length passages from documents ranked by relevance against the query. In this paper, we present and compare novel, language-model based methods for extr...
Qing Li, K. Selçuk Candan, Qi Yan
« Prev « First page 1047 / 1144 Last » Next »