Sciweavers

1219 search results - page 225 / 244
» Where to Look Next
Sort
View
CRYPTO
2004
Springer
120views Cryptology» more  CRYPTO 2004»
14 years 3 months ago
Round-Optimal Secure Two-Party Computation
Abstract. We consider the central cryptographic task of secure twoparty computation, where two parties wish to compute some function of their private inputs (each receiving possibl...
Jonathan Katz, Rafail Ostrovsky
ICA
2004
Springer
14 years 3 months ago
Second-Order Blind Source Separation Based on Multi-dimensional Autocovariances
SOBI is a blind source separation algorithm based on time decorrelation. It uses multiple time autocovariance matrices, and performs joint diagonalization thus being more robust th...
Fabian J. Theis, Anke Meyer-Bäse, Elmar Wolfg...
ICCHP
2004
Springer
14 years 3 months ago
Exploring Scalable Vector Graphics for Visually Impaired Users
Graphical information is very important in common information publishing. For visually impaired users this information is usually not accessible. Scalable Vector Graphics, a recomm...
Martin Rotard, Kerstin Otte, Thomas Ertl
MATA
2004
Springer
103views Communications» more  MATA 2004»
14 years 3 months ago
Mobility Prediction for Mobile Agent-Based Service Continuity in the Wireless Internet
New challenging deployment scenarios are integrating mobile devices with limited and heterogeneous capabilities that roam among wireless access localities during service provisioni...
Paolo Bellavista, Antonio Corradi, Carlo Giannelli
PKDD
2004
Springer
205views Data Mining» more  PKDD 2004»
14 years 3 months ago
Breaking Through the Syntax Barrier: Searching with Entities and Relations
The next wave in search technology will be driven by the identification, extraction, and exploitation of real-world entities represented in unstructured textual sources. Search sy...
Soumen Chakrabarti