Sciweavers

528 search results - page 21 / 106
» What Can We Learn Privately
Sort
View
IADIS
2008
13 years 9 months ago
Is Mobile Learning A Substitute For Electronic Learning?
Mobile learning is widely regarded as the next generation of learning technologies, and refers to the use of mobile devices in education to enhance learning activities. The increa...
Jirarat Sitthiworachart, Mike Joy
ICALT
2006
IEEE
14 years 1 months ago
Building Learning Networks for Lifelong Learners: Challenges, Models, Technologies and Standards
In this tutorial five key problems are discussed that occur in the area of lifelong learning. For each problem we will look at the possible technological solutions. The five probl...
Rob Koper
SIGMOD
2009
ACM
157views Database» more  SIGMOD 2009»
14 years 7 months ago
FPGA: what's in it for a database?
While there seems to be a general agreement that next years' systems will include many processing cores, it is often overlooked that these systems will also include an increa...
Jens Teubner, René Müller
ACNS
2009
Springer
123views Cryptology» more  ACNS 2009»
14 years 2 months ago
Practical Secure Evaluation of Semi-private Functions
Abstract. Two-party Secure Function Evaluation (SFE) is a very useful cryptographic tool which allows two parties to evaluate a function known to both parties on their private (sec...
Annika Paus, Ahmad-Reza Sadeghi, Thomas Schneider
OPODIS
2007
13 years 9 months ago
Secretive Birds: Privacy in Population Protocols
We study private computations in a system of tiny mobile agents. We consider the mobile population protocol model of Angluin et al. [2] and ask what can be computed without ever re...
Carole Delporte-Gallet, Hugues Fauconnier, Rachid ...