Sciweavers

182 search results - page 16 / 37
» The Secret Art of Computer Programming
Sort
View
ACMIDC
2009
15 years 6 months ago
Voices beyond walls: the role of digital storytelling for empowering marginalized youth in refugee camps
In this paper we consider the role of digital storytelling for creative empowerment of marginalized youth, through a threeyear program of workshops conducted in the context of Pal...
Nitin "Nick" Sawhney
117
Voted
DRM
2007
Springer
15 years 9 months ago
Slicing obfuscations: design, correctness, and evaluation
The goal of obfuscation is to transform a program, without affecting its functionality, such that some secret information within the program can be hidden for as long as possible...
Anirban Majumdar, Stephen Drape, Clark D. Thombors...
94
Voted
ACL
2010
15 years 23 days ago
Letter-Phoneme Alignment: An Exploration
Letter-phoneme alignment is usually generated by a straightforward application of the EM algorithm. We explore several alternative alignment methods that employ phonetics, integer...
Sittichai Jiampojamarn, Grzegorz Kondrak
141
Voted
KDD
2006
ACM
213views Data Mining» more  KDD 2006»
16 years 3 months ago
Learning sparse metrics via linear programming
Calculation of object similarity, for example through a distance function, is a common part of data mining and machine learning algorithms. This calculation is crucial for efficie...
Glenn Fung, Rómer Rosales
91
Voted
ISCC
2007
IEEE
15 years 9 months ago
Gaining Flexibility by Security Protocol Transfer
Even though PDAs in general—but smartcards in particular—can be trusted to keep secrets, because they have meager resources, including them in security protocols is difficult...
Per Harald Myrvang, Tage Stabell-Kulø