Sciweavers

66 search results - page 11 / 14
» On the use of tolerant graded inclusions in information retr...
Sort
View
ACMIDC
2010
13 years 11 months ago
Paper-based multimedia interaction as learning tool for disabled children
The purpose of our research is to support cognitive, motor, and emotional development of severely disabled children in the school context. We designed and implemented a set of nov...
Franca Garzotto, Manuel Bordogna
EUROCRYPT
2010
Springer
14 years 5 days ago
Public-Key Encryption in the Bounded-Retrieval Model
We construct the first public-key encryption scheme in the Bounded-Retrieval Model (BRM), providing security against various forms of adversarial “key leakage” attacks. In th...
Joël Alwen, Yevgeniy Dodis, Moni Naor, Gil Se...
CIKM
2010
Springer
13 years 6 months ago
Learning to rank relevant and novel documents through user feedback
We consider the problem of learning to rank relevant and novel documents so as to directly maximize a performance metric called Expected Global Utility (EGU), which has several de...
Abhimanyu Lad, Yiming Yang
UIC
2007
Springer
14 years 1 months ago
Mesh-Based Sensor Relocation for Coverage Maintenance in Mobile Sensor Networks
Abstract. Sensor relocation protocols can be employed as fault tolerance approach to offset the coverage loss caused by node failures. We introduce a novel localized structure, in...
Xu Li, Nicola Santoro, Ivan Stojmenovic
GIS
2009
ACM
14 years 8 months ago
PROS: A Peer-to-Peer System for Location Privacy Protection on Road Networks
The k-anonymity technique is widely used to provide location privacy protection for accessing location-based services (LBS), i.e., the exact location of a query initiator is cloak...
Jie Bao 0003, Haiquan Chen, Wei-Shinn Ku