Sciweavers

14248 search results - page 2794 / 2850
» Queries
Sort
View
JSW
2008
196views more  JSW 2008»
13 years 7 months ago
Providing Data Items with Time Constraints in Multi-Channel Broadcasting Environments
In a mobile computing system, users carrying portable devices can access database services from any location without requiring a fixed position in the networking environment. Some ...
Ding-Jung Chiang, Hwei-Jen Lin, Timothy K. Shih
JUCS
2008
156views more  JUCS 2008»
13 years 7 months ago
Efficient k-out-of-n Oblivious Transfer Schemes
Abstract: Oblivious transfer is an important cryptographic protocol in various security applications. For example, in on-line transactions, a k-out-of-n oblivious transfer scheme a...
Cheng-Kang Chu, Wen-Guey Tzeng
DSS
2007
96views more  DSS 2007»
13 years 7 months ago
Factors relating to the decision to click on a sponsored link
In this paper, we report results of an investigation into the factors influencing the selection of sponsored links by e-commerce Web searchers. In this research, 56 participants e...
Bernard J. Jansen, Anna Brown, Marc Resnick
ECCC
2007
86views more  ECCC 2007»
13 years 7 months ago
Testing Halfspaces
This paper addresses the problem of testing whether a Boolean-valued function f is a halfspace, i.e. a function of the form f(x) = sgn(w·x−θ). We consider halfspaces over the ...
Kevin Matulef, Ryan O'Donnell, Ronitt Rubinfeld, R...
MICRO
2008
IEEE
146views Hardware» more  MICRO 2008»
13 years 7 months ago
A small cache of large ranges: Hardware methods for efficiently searching, storing, and updating big dataflow tags
Dynamically tracking the flow of data within a microprocessor creates many new opportunities to detect and track malicious or erroneous behavior, but these schemes all rely on the...
Mohit Tiwari, Banit Agrawal, Shashidhar Mysore, Jo...
« Prev « First page 2794 / 2850 Last » Next »