Sciweavers

15614 search results - page 3091 / 3123
» The State of State
Sort
View
SIAMCOMP
2011
13 years 3 months ago
Black-Box Constructions of Protocols for Secure Computation
In this paper, we study the question of whether or not it is possible to construct protocols for general secure computation in the setting of malicious adversaries and no honest m...
Iftach Haitner, Yuval Ishai, Eyal Kushilevitz, Yeh...
SIAMMA
2011
98views more  SIAMMA 2011»
13 years 3 months ago
Time-Periodic Linearized Solutions of the Compressible Euler Equations and a Problem of Small Divisors
It has been unknown since the time of Euler whether or not time-periodic sound wave propagation is physically possible in the compressible Euler equations, due mainly to the ubiqui...
Blake Temple, Robin Young
TASLP
2011
13 years 3 months ago
A Generative Student Model for Scoring Word Reading Skills
—This paper presents a novel student model intended to automate word-list-based reading assessments in a classroom setting, specifically for a student population that includes b...
Joseph Tepperman, Sungbok Lee, Shrikanth Narayanan...
WWW
2011
ACM
13 years 3 months ago
Second international workshop on RESTful design (WS-REST 2011)
Over the past few years, the discussion between the two major architectural styles for designing and implementing Web services, the RPC-oriented approach and the resourceoriented ...
Cesare Pautasso, Erik Wilde, Rosa Alarcón
IHI
2010
197views Healthcare» more  IHI 2010»
13 years 3 months ago
Beyond safe harbor: automatic discovery of health information de-identification policy alternatives
Regulations in various countries permit the reuse of health information without patient authorization provided the data is "de-identified". In the United States, for ins...
Kathleen Benitez, Grigorios Loukides, Bradley Mali...
« Prev « First page 3091 / 3123 Last » Next »