Sciweavers

658 search results - page 18 / 132
» Open problems in the security of learning
Sort
View
SMC
2010
IEEE
121views Control Systems» more  SMC 2010»
13 years 6 months ago
Learning of personalized security settings
—While many cybersecurity tools are available to computer users, their default configurations often do not match needs of specific users. Since most modern users are not computer...
Mehrbod Sharifi, Eugene Fink, Jaime G. Carbonell
ACSAC
2005
IEEE
14 years 1 months ago
Lessons Learned: A Security Analysis of the Internet Chess Club
The Internet Chess Club (ICC) is a popular online chess server with more than 30,000 members worldwide including various celebrities and the best chess players in the world. Altho...
John Black, Martin Cochran, Martin Ryan Gardner
ECIR
2004
Springer
13 years 9 months ago
Answer Selection in a Multi-stream Open Domain Question Answering System
Abstract. Question answering systems aim to meet users' information needs by returning exact answers in response to a question. Traditional open domain question answering syst...
Valentin Jijkoun, Maarten de Rijke
TLT
2010
124views more  TLT 2010»
13 years 6 months ago
Bootstrapping a Culture of Sharing to Facilitate Open Educational Resources
—It seems self-evident that life for teachers would be simplified if there existed a large corpus of relevant resources that was available for them to reuse and for inquisitive s...
Hugh C. Davis, Leslie Carr, Jessie M. N. Hey, Yvon...
ASIACRYPT
2000
Springer
14 years 14 hour ago
From Fixed-Length to Arbitrary-Length RSA Padding Schemes
A common practice for signing with RSA is to first apply a hash function or a redundancy function to the message, add some padding and exponentiate the resulting padded message us...
Jean-Sébastien Coron, François Koeun...