Sciweavers

1006 search results - page 156 / 202
» What is this page known for
Sort
View
ICFCA
2004
Springer
14 years 2 months ago
Automated Lattice Drawing
Lattice diagrams, known as Hasse diagrams, have played an ever increasing role in lattice theory and fields that use lattices as a tool. Initially regarded with suspicion, they no...
Ralph Freese
EUROCRYPT
2003
Springer
14 years 1 months ago
On the Limitations of Universally Composable Two-Party Computation without Set-up Assumptions
The recently proposed universally composable (UC) security framework for analyzing security of cryptographic protocols provides very strong security guarantees. In particular, a p...
Ran Canetti, Eyal Kushilevitz, Yehuda Lindell
FQAS
1998
Springer
133views Database» more  FQAS 1998»
14 years 28 days ago
Estimating the Quality of Databases
Abstract. With more and more electronic information sources becoming widely available, the issue of the quality of these often-competing sources has become germane. We propose a st...
Amihai Motro, Igor Rakov
CLEF
2008
Springer
13 years 10 months ago
A Study of Users' Image Seeking Behaviour in FlickLing
This study aims to explore users' image seeking behaviour when searching for a known, non-annotated image in Flickling provided by iCLEF2008 track. The task assigned to users...
Evgenia Vassilakaki, Frances C. Johnson, Richard J...
CRYPTO
2008
Springer
186views Cryptology» more  CRYPTO 2008»
13 years 10 months ago
Communication Complexity in Algebraic Two-Party Protocols
In cryptography, there has been tremendous success in building various two-party protocols with small communication complexity out of homomorphic semantically-secure encryption sc...
Rafail Ostrovsky, William E. Skeith III