Sciweavers

846 search results - page 135 / 170
» The Use of Z
Sort
View
SCN
2008
Springer
13 years 7 months ago
Two Generic Constructions of Probabilistic Cryptosystems and Their Applications
In this paper, we build, in a generic way, two asymmetric cryptosystems with a careful study of their security. We present first an additively homomorphic scheme which generalizes,...
Guilhem Castagnos
SIGIR
2008
ACM
13 years 7 months ago
Optimizing relevance and revenue in ad search: a query substitution approach
The primary business model behind Web search is based on textual advertising, where contextually relevant ads are displayed alongside search results. We address the problem of sel...
Filip Radlinski, Andrei Z. Broder, Peter Ciccolo, ...
INFSOF
2007
104views more  INFSOF 2007»
13 years 7 months ago
A state-based approach to integration testing based on UML models
: Correct functioning of object-oriented software depends upon the successful integration of classes. While individual classes may function correctly, several new faults can arise ...
Shaukat Ali, Lionel C. Briand, Muhammad Jaffar-Ur ...
TWC
2008
169views more  TWC 2008»
13 years 7 months ago
Antenna subset diversity with non-ideal channel estimation
In modern wireless systems employing diversity techniques, combining all the available diversity branches may not be feasible due to complexity and resource constraints. To allevia...
Wesley M. Gifford, Moe Z. Win, Marco Chiani
CG
2004
Springer
13 years 7 months ago
Time-critical rendering for time-varying volume data
In this paper, we present a novel method to meet the time-critical requirement in rendering time-varying volume data. In time-critical rendering, the rendering is demanded to be c...
Shih-Kuan Liao, Jim Z. C. Lai, Yeh-Ching Chung