Sciweavers

250 search results - page 18 / 50
» Using information fragments to answer the questions develope...
Sort
View
CC
2006
Springer
125views System Software» more  CC 2006»
13 years 7 months ago
A tight lower bound for restricted pir protocols
We show that any 1-round 2-server Private Information Retrieval Protocol where the answers are 1-bit long must ask questions that are at least n - 2 bits long, which is nearly equa...
Richard Beigel, Lance Fortnow, William I. Gasarch
SIGUCCS
2006
ACM
14 years 1 months ago
Better results in mathematics lessons with a virtual personal teacher
In this paper we present the results of an experiment made with our e-librarian service ”MatES”, an e-Learning tool on fractions in mathematics. MatES allows students to enter...
Serge Linckels, Carole Dording, Christoph Meinel
GG
2010
Springer
13 years 5 months ago
Declarative Mesh Subdivision Using Topological Rewriting in MGS
Mesh subdivision algorithms are usually specified informally using graphical schemes defining local mesh refinements. These algorithms are then implemented efficiently in an impera...
Antoine Spicher, Olivier Michel, Jean-Louis Giavit...
PODS
1995
ACM
139views Database» more  PODS 1995»
13 years 11 months ago
Normalizing Incomplete Databases
Databases are often incomplete because of the presence of disjunctive information, due to con icts, partial knowledge and other reasons. Queries against such databases often ask q...
Leonid Libkin
CHI
1999
ACM
13 years 12 months ago
Cooperative Inquiry: Developing new Technologies for Children with Children
In today’s homes and schools, children are emerging as frequent and experienced users of technology [3, 14]. As this trend continues, it becomes increasingly important to ask if...
Allison Druin