Sciweavers

2490 search results - page 450 / 498
» The Generalized Theory of Model Preference
Sort
View
146
Voted
EUROCRYPT
2007
Springer
15 years 10 months ago
Secure Computation from Random Error Correcting Codes
Abstract. Secure computation consists of protocols for secure arithmetic: secret values are added and multiplied securely by networked processors. The striking feature of secure co...
Hao Chen, Ronald Cramer, Shafi Goldwasser, Robbert...
119
Voted
IPSN
2007
Springer
15 years 9 months ago
The worst-case capacity of wireless sensor networks
The key application scenario of wireless sensor networks is data gathering: sensor nodes transmit data, possibly in a multi-hop fashion, to an information sink. The performance of...
Thomas Moscibroda
140
Voted
VEE
2006
ACM
102views Virtualization» more  VEE 2006»
15 years 9 months ago
A stackless runtime environment for a Pi-calculus
The Pi-calculus is a formalism to model and reason about highly concurrent and dynamic systems. Most of the expressive power of the language comes from the ability to pass communi...
Frédéric Peschanski, Samuel Hym
141
Voted
ACMICEC
2005
ACM
175views ECommerce» more  ACMICEC 2005»
15 years 9 months ago
A theoretic discussion of tourism e-commerce
This paper presents the model of e-market structure and process analysis of tourism e-commerce. First the tourism e-commerce status quo is given clearly; secondly e-commerce and i...
Si-qing Liu
134
Voted
MIR
2005
ACM
137views Multimedia» more  MIR 2005»
15 years 9 months ago
Similarity space projection for web image search and annotation
Web image search has been explored and developed in academic as well as commercial areas for over a decade. To measure the similarity between Web images and user queries, most of ...
Ying Liu, Tao Qin, Tie-Yan Liu, Lei Zhang, Wei-Yin...