Sciweavers

1395 search results - page 252 / 279
» Modeling betweenness for question answering
Sort
View
STOC
2009
ACM
145views Algorithms» more  STOC 2009»
16 years 4 months ago
Non-malleable extractors and symmetric key cryptography from weak secrets
We study the question of basing symmetric key cryptography on weak secrets. In this setting, Alice and Bob share an n-bit secret W, which might not be uniformly random, but the ad...
Yevgeniy Dodis, Daniel Wichs
EUROSYS
2009
ACM
16 years 1 months ago
User interactions in social networks and their implications
Social networks are popular platforms for interaction, communication and collaboration between friends. Researchers have recently proposed an emerging class of applications that l...
Christo Wilson, Bryce Boe, Alessandra Sala, Krishn...
ITICSE
2004
ACM
15 years 9 months ago
What do we mean by theoretically sound research in computer science education?
With our interest to improve our education in computer science, an understanding of how students learn about CS concepts, how different concepts are understood, as well as the con...
Mordechai Ben-Ari, Anders Berglund, Shirley Booth,...
EMSOFT
2009
Springer
15 years 8 months ago
Modular static scheduling of synchronous data-flow networks: an efficient symbolic representation
This paper addresses the question of producing modular sequential imperative code from synchronous data-flow networks. Precisely, given a system with several input and output flow...
Marc Pouzet, Pascal Raymond
CAISE
2006
Springer
15 years 7 months ago
Loosely-Coupled Process Automation in Medical Environments
Abstract. We discuss a case study for the hospital scenario where workflow model components are distributed across various computers or devices (e.g. mobile phones, PDAs, sensors, ...
Jurate Vysniauskaite