Sciweavers

528 search results - page 68 / 106
» What Can We Learn Privately
Sort
View
IH
2007
Springer
14 years 3 months ago
A Graph Game Model for Software Tamper Protection
We present a probabilistic program-transformation algorithm to render a given program tamper-resistant. In addition, we suggest a model to estimate the required effort for an atta...
Nenad Dedic, Mariusz H. Jakubowski, Ramarathnam Ve...
ALGORITHMICA
2005
76views more  ALGORITHMICA 2005»
13 years 9 months ago
Characterizing History Independent Data Structures
We consider history independent data structures as proposed for study by Naor and Teague [3]. In a history independent data structure, nothing can be learned from the memory repre...
Jason D. Hartline, Edwin S. Hong, Alexander E. Moh...
VR
2007
IEEE
14 years 3 months ago
Designing and Evaluating a Haptic System for Biomolecular Education
In this paper we present an in situ evaluation of a haptic system, with a representative test population, we aim to determine what, if any, benefit haptics can have in a biomolec...
Petter Bivall Persson, Matthew D. Cooper, Lena A. ...
ESWS
2007
Springer
14 years 3 months ago
Intelligent Search in a Collection of Video Lectures
ct In recent years, the use of streamed digital video as a teaching and learning resource has become an increasingly attractive option for many educators as an innovation which exp...
Angela Fogarolli
INFOCOM
2009
IEEE
14 years 4 months ago
Analysis of Adaptive Incentive Protocols for P2P Networks
— Incentive protocols play a crucial role to encourage cooperation among nodes in networking applications. The aim of this paper is to provide a general analytical framework to a...
Ben Q. Zhao, John C. S. Lui, Dah-Ming Chiu