Sciweavers

2200 search results - page 387 / 440
» The Generalized Pignistic Transformation
Sort
View
160
Voted
CRYPTO
2010
Springer
181views Cryptology» more  CRYPTO 2010»
15 years 5 months ago
On the Efficiency of Classical and Quantum Oblivious Transfer Reductions
Due to its universality oblivious transfer (OT) is a primitive of great importance in secure multi-party computation. OT is impossible to implement from scratch in an unconditional...
Severin Winkler, Jürg Wullschleger
HUC
2010
Springer
15 years 5 months ago
Remarkable objects: supporting collaboration in a creative environment
(a) (b) Figure 1: (a) CAM running on an iPhone; (b) Reading a design sketch using Microsoft's TagReader client. In this paper, we report the results of a field trial of a Ubi...
Dhaval Vyas, Anton Nijholt, Dirk Heylen, Alexander...
149
Voted
CCS
2010
ACM
15 years 4 months ago
TASTY: tool for automating secure two-party computations
Secure two-party computation allows two untrusting parties to jointly compute an arbitrary function on their respective private inputs while revealing no information beyond the ou...
Wilko Henecka, Stefan Kögl, Ahmad-Reza Sadegh...
SIGIR
2010
ACM
15 years 4 months ago
Score distribution models: assumptions, intuition, and robustness to score manipulation
Inferring the score distribution of relevant and non-relevant documents is an essential task for many IR applications (e.g. information filtering, recall-oriented IR, meta-search,...
Evangelos Kanoulas, Keshi Dai, Virgiliu Pavlu, Jav...
ECAI
2010
Springer
15 years 4 months ago
Learning to Author Text with textual CBR
Abstract. Textual reuse is an integral part of textual case-based reasoning (TCBR) which deals with solving new problems by reusing previous similar problem-solving experiences doc...
Ibrahim Adeyanju, Nirmalie Wiratunga, Juan A. Reci...