Sciweavers

719 search results - page 128 / 144
» What HMMs Can Do
Sort
View
EUROCRYPT
1997
Springer
13 years 11 months ago
Oblivious Transfers and Privacy Amplification
Oblivious transfer (OT) is an important primitive in cryptography. In chosen one-out-of-two string OT, a sender offers two strings, one of which the other party, called the receive...
Gilles Brassard, Claude Crépeau
LISA
2007
13 years 9 months ago
Policy-Driven Management of Data Sets
Contemporary storage systems separate the management of data from the management of the underlying physical storage media used to store that data. This separation is artificial an...
Jim Holl, Kostadis Roussos, Jim Voll
BCSHCI
2007
13 years 9 months ago
Design, use and experience of e-learning systems
The use of computer applications to support learning and assessment is becoming more common, along with a growing body of research focusing on the pedagogical effectiveness of the...
Willem-Paul Brinkman, Annette Payne, Nayna Patel, ...
ECIS
2001
13 years 9 months ago
Data Modelling Languages: An Ontological Study
There are many data modelling languages used in today's information systems engineering environment. Some of the data modelling languages used have a degree of hype surroundi...
Simon K. Milton, Edmund Kazmierczak, Chris Keen
CCS
2010
ACM
13 years 7 months ago
DIFC programs by automatic instrumentation
Decentralized information flow control (DIFC) operating systems provide applications with mechanisms for enforcing information-flow policies for their data. However, significant o...
William R. Harris, Somesh Jha, Thomas W. Reps