Sciweavers

182 search results - page 16 / 37
» The Secret Art of Computer Programming
Sort
View
ACMIDC
2009
13 years 11 months ago
Voices beyond walls: the role of digital storytelling for empowering marginalized youth in refugee camps
In this paper we consider the role of digital storytelling for creative empowerment of marginalized youth, through a threeyear program of workshops conducted in the context of Pal...
Nitin "Nick" Sawhney
DRM
2007
Springer
14 years 1 months ago
Slicing obfuscations: design, correctness, and evaluation
The goal of obfuscation is to transform a program, without affecting its functionality, such that some secret information within the program can be hidden for as long as possible...
Anirban Majumdar, Stephen Drape, Clark D. Thombors...
ACL
2010
13 years 5 months ago
Letter-Phoneme Alignment: An Exploration
Letter-phoneme alignment is usually generated by a straightforward application of the EM algorithm. We explore several alternative alignment methods that employ phonetics, integer...
Sittichai Jiampojamarn, Grzegorz Kondrak
KDD
2006
ACM
213views Data Mining» more  KDD 2006»
14 years 7 months ago
Learning sparse metrics via linear programming
Calculation of object similarity, for example through a distance function, is a common part of data mining and machine learning algorithms. This calculation is crucial for efficie...
Glenn Fung, Rómer Rosales
ISCC
2007
IEEE
14 years 1 months ago
Gaining Flexibility by Security Protocol Transfer
Even though PDAs in general—but smartcards in particular—can be trusted to keep secrets, because they have meager resources, including them in security protocols is difficult...
Per Harald Myrvang, Tage Stabell-Kulø