Sciweavers

3706 search results - page 559 / 742
» The Transformational Approach to Program Development
Sort
View
109
Voted
IACR
2011
97views more  IACR 2011»
14 years 2 months ago
Two-Output Secure Computation with Malicious Adversaries
We present a method to compile Yao’s two-player garbled circuit protocol into one that is secure against malicious adversaries that relies on witness indistinguishability. Our ap...
Abhi Shelat, Chih-Hao Shen
229
Voted
IUI
2012
ACM
13 years 10 months ago
Automatic reverse engineering of interactive dynamic web applications to support adaptation across platforms
The effort and time required to develop user interface models has been one of the main limitations to the adoption of model-based approaches, which enable intelligent processing o...
Federico Bellucci, Giuseppe Ghiani, Fabio Patern&o...
INFOCOM
2012
IEEE
13 years 5 months ago
Submodular game for distributed application allocation in shared sensor networks
Abstract—Wireless sensor networks are evolving from singleapplication platforms towards an integrated infrastructure shared by multiple applications. Given the resource constrain...
Chengjie Wu, You Xu, Yixin Chen, Chenyang Lu
117
Voted
WWW
2007
ACM
16 years 3 months ago
Supervised rank aggregation
This paper is concerned with rank aggregation, the task of combining the ranking results of individual rankers at meta-search. Previously, rank aggregation was performed mainly by...
Yu-Ting Liu, Tie-Yan Liu, Tao Qin, Zhiming Ma, Han...
151
Voted
VLDB
2005
ACM
162views Database» more  VLDB 2005»
15 years 8 months ago
FiST: Scalable XML Document Filtering by Sequencing Twig Patterns
In recent years, publish-subscribe (pub-sub) systems based on XML document filtering have received much attention. In a typical pubsub system, subscribed users specify their inte...
Joonho Kwon, Praveen Rao, Bongki Moon, Sukho Lee