Sciweavers

1615 search results - page 234 / 323
» What's new
Sort
View
ECCC
2007
144views more  ECCC 2007»
13 years 8 months ago
Algebraic Lower Bounds for Computing on Encrypted Data
In cryptography, there has been tremendous success in building primitives out of homomorphic semantically-secure encryption schemes, using homomorphic properties in a blackbox way...
Rafail Ostrovsky, William E. Skeith III
MLQ
2008
63views more  MLQ 2008»
13 years 8 months ago
Generic cuts in models of arithmetic
We present some general results concerning the topological space of cuts of a countable model of arithmetic given by a particular indicator Y . The notion of `indicator' is d...
Richard Kaye
JTAER
2006
109views more  JTAER 2006»
13 years 8 months ago
Shopping Online or Not? Cognition and Personality Matters
E-commerce has brought both opportunities and challenges to Internet marketers. One challenge facing the marketers is to "convert" Internet users who are reluctant to bu...
Sophia Wang, Simon Wang, Ming T. Wang
JUCS
2006
145views more  JUCS 2006»
13 years 8 months ago
Computer Science, Logic, Informatics Education
: Our aim is to discuss what, when and, how deep logic should be taught in the computer science education in connection with the so called "Bologna process". We survey th...
Katalin Pásztor-Varga, Magda Várter&...
KES
2006
Springer
13 years 8 months ago
Web Site Off-Line Structure Reconfiguration: A Web User Browsing Analysis
The correct web site text content must be help to the visitors to find what they are looking for. However, the reality is quite different, many times the web page text content is a...
Sebastián A. Ríos, Juan D. Vel&aacut...