Sciweavers

3092 search results - page 537 / 619
» Where are you pointing
Sort
View
TCC
2009
Springer
117views Cryptology» more  TCC 2009»
14 years 9 months ago
Towards a Theory of Extractable Functions
Extractable functions are functions where any adversary that outputs a point in the range of the function is guaranteed to "know" a corresponding preimage. Here, knowledg...
Ran Canetti, Ronny Ramzi Dakdouk
MOBIHOC
2009
ACM
14 years 9 months ago
Predict and relay: an efficient routing in disruption-tolerant networks
Routing is one of the most challenging open problems in disruption-tolerant networks (DTNs) because of the shortlived wireless connectivity environment. To deal with this issue, r...
Quan Yuan, Ionut Cardei, Jie Wu
KDD
2007
ACM
141views Data Mining» more  KDD 2007»
14 years 9 months ago
Detecting anomalous records in categorical datasets
We consider the problem of detecting anomalies in high arity categorical datasets. In most applications, anomalies are defined as data points that are 'abnormal'. Quite ...
Kaustav Das, Jeff G. Schneider
KDD
2004
ACM
124views Data Mining» more  KDD 2004»
14 years 9 months ago
Automatic multimedia cross-modal correlation discovery
Given an image (or video clip, or audio song), how do we automatically assign keywords to it? The general problem is to find correlations across the media in a collection of multi...
Jia-Yu Pan, Hyung-Jeong Yang, Christos Faloutsos, ...
CHI
2008
ACM
14 years 9 months ago
Mischief: supporting remote teaching in developing regions
Mischief is a system to support traditional classroom practices between a remote instructor and a group of collocated students. Meant for developing regions, each student in the c...
Neema Moraveji, Taemie Kim, James Ge, Udai Singh P...