Sciweavers

2091 search results - page 376 / 419
» Time, Relevance and Interaction Modelling for Information Re...
Sort
View
EUROCRYPT
2001
Springer
14 years 14 days ago
Priced Oblivious Transfer: How to Sell Digital Goods
Abstract. We consider the question of protecting the privacy of customers buying digital goods. More specifically, our goal is to allow a buyer to purchase digital goods from a ve...
William Aiello, Yuval Ishai, Omer Reingold
ACL
1998
13 years 9 months ago
Learning Intonation Rules for Concept to Speech Generation
In this paper, we report on an effort to provide a general-purpose spoken language generation tool for Concept-to-Speech (CTS) applications by extending a widely used text generat...
Shimei Pan, Kathleen McKeown
CHI
2004
ACM
14 years 8 months ago
Unintended effects: varying icon spacing changes users' visual search strategy
Users of modern GUIs routinely engage in visual searches for various control items, such as buttons and icons. Because this is so ubiquitous, it is important that the visual prope...
Sarah P. Everett, Michael D. Byrne
HICSS
2006
IEEE
179views Biometrics» more  HICSS 2006»
14 years 2 months ago
e-Government Integration with Web Services and Alerts: A Case Study on an Emergency Route Advisory System in Hong Kong
Quick and efficient response to emergency is important for every city. This depends on the quality of the dispatch of emergency service to the scene and back to hospital or other ...
Cherrie W. W. Ng, Dickson K. W. Chiu
CCS
2004
ACM
14 years 1 months ago
MAC and UML for secure software design
Security must be a first class citizen in the design of large scale, interacting, software applications, at early and all stages of the lifecycle, for accurate and precise policy ...
Thuong Doan, Steven A. Demurjian, T. C. Ting, Andr...