Sciweavers

2846 search results - page 25 / 570
» Not one click for security
Sort
View
126
Voted
DOLAP
2000
ACM
15 years 8 months ago
Analyzing Clickstreams Using Subsessions
Analyzing data obtained from web server logs, so-called “clickstreams”, is rapidly becoming one of the most important activities for companies in any sector as most businesses...
Jesper Andersen, Anders Giversen, Allan H. Jensen,...
CVPR
1999
IEEE
16 years 6 months ago
User Assisted Modeling of Buildings from Aerial Images
An approach that allows a user to assist an automatic system in modeling buildings is described. The approach is designed to be efficient in user time and effort while preserving ...
J. Li, Ramakant Nevatia, Sanjay Noronha
TCC
2009
Springer
169views Cryptology» more  TCC 2009»
16 years 4 months ago
Goldreich's One-Way Function Candidate and Myopic Backtracking Algorithms
Abstract. Goldreich (ECCC 2000) proposed a candidate one-way function construction which is parameterized by the choice of a small predicate (over d = O(1) variables) and of a bipa...
James Cook, Omid Etesami, Rachel Miller, Luca Trev...
SIGCOMM
2010
ACM
15 years 4 months ago
Trust no one: a decentralized matching service for privacy in location based services
We propose a new approach to ensure privacy in location based services, without requiring any support from a"trusted" entity. We observe that users of location based ser...
Sharad Jaiswal, Animesh Nandi
133
Voted
FOCS
2002
IEEE
15 years 9 months ago
On the (non)Universality of the One-Time Pad
Randomization is vital in cryptography: secret keys should be randomly generated and most cryptographic primitives (e.g., encryption) must be probabilistic. As a bstraction, it is...
Yevgeniy Dodis, Joel Spencer