Sciweavers

2927 search results - page 192 / 586
» Secure Distributed Human Computation
Sort
View
COLING
2002
15 years 2 months ago
The Computation of Word Associations: Comparing Syntagmatic and Paradigmatic Approaches
It is shown that basic language processes such as the production of free word associations and the generation of synonyms can be simulated using statistical models that analyze th...
Reinhard Rapp
PODC
2010
ACM
15 years 2 months ago
On the theoretical gap between synchronous and asynchronous MPC protocols
Multiparty computation (MPC) protocols among n parties secure against t active faults are known to exist if and only if
Zuzana Beerliová-Trubíniová, ...
GPC
2009
Springer
15 years 7 days ago
Integrity Assurance Technique Using Determinant Approach
Data integrity is an important aspect of storage security and reliability which are prerequisite for most computer systems and network applications. This paper proposes a new tech...
Jasim A. Ghaeb
IJISEC
2007
119views more  IJISEC 2007»
15 years 2 months ago
An incentive compatible reputation mechanism for ubiquitous computing environments
The vision of ubiquitous computing is becoming a reality thanks to the advent of portable devices and the advances in wireless networking technologies. It aims to facilitate user ...
Jinshan Liu, Valérie Issarny
111
Voted
PUC
2008
141views more  PUC 2008»
15 years 1 months ago
A calendar based Internet content pre-caching agent for small computing devices
We described in earlier publications the principles of a system where internet content would be pre-cached, based on contextual information obtained from a user's electronic ...
Andreas Komninos, Mark D. Dunlop