Sciweavers

1995 search results - page 312 / 399
» What's the Problem
Sort
View
CHI
2011
ACM
14 years 7 months ago
Social and technical challenges in parenting teens' social media use
With millions of teenagers on the Internet, millions of parents are trying to understand what their teens are doing and why. Understanding how technology use impacts teens‘ lear...
Sarita Yardi, Amy Bruckman
214
Voted
DCG
2011
14 years 7 months ago
A Celtic Framework for Knots and Links
We describe a variant of a method used by modern graphic artists to design what are traditionally called Celtic knots, which are part of a larger family of designs called “mirro...
Jonathan L. Gross, Thomas W. Tucker
CCS
2011
ACM
14 years 3 months ago
Automatically optimizing secure computation
On the one hand, compilers for secure computation protocols, such as FairPlay or FairPlayMP, have significantly simplified the development of such protocols. On the other hand, ...
Florian Kerschbaum
HOST
2011
IEEE
14 years 3 months ago
Enhancing security via provably trustworthy hardware intellectual property
—We introduce a novel hardware intellectual property acquisition protocol, show how it can support the transfer of provably trustworthy modules between hardware IP producers and ...
Eric Love, Yier Jin, Yiorgos Makris
155
Voted
JMLR
2012
13 years 6 months ago
A metric learning perspective of SVM: on the relation of LMNN and SVM
Support Vector Machines, SVMs, and the Large Margin Nearest Neighbor algorithm, LMNN, are two very popular learning algorithms with quite different learning biases. In this paper...
Huyen Do, Alexandros Kalousis, Jun Wang, Adam Wozn...