Sciweavers

192 search results - page 32 / 39
» Who gets spammed
Sort
View
CRYPTO
2005
Springer
106views Cryptology» more  CRYPTO 2005»
14 years 1 months ago
Secure Computation of Constant-Depth Circuits with Applications to Database Search Problems
Motivated by database search problems such as partial match or nearest neighbor, we present secure multiparty computation protocols for constant-depth circuits. Specifically, for ...
Omer Barkol, Yuval Ishai
JCDL
2004
ACM
181views Education» more  JCDL 2004»
14 years 27 days ago
The 3D vase museum: a new approach to context in a digital library
We present a new approach to displaying and browsing a digital library collection, a set of Greek vases in the Perseus digital library. Our design takes advantage of three-dimensi...
Horn-yeu Shiaw, Robert J. K. Jacob, Gregory R. Cra...
KR
2004
Springer
14 years 25 days ago
Historical Remarks on Nonmonotonic Reasoning, Especially Circumscription
Humans have always done nonmonotonic reasoning, but rigorous monotonic reasoning in reaching given conclusions has been deservedly more respected and admired. Euclid contains the ...
John McCarthy
HICSS
2003
IEEE
90views Biometrics» more  HICSS 2003»
14 years 23 days ago
Web Community of Agents for the Integrated Logistics of Industrial Districts
The industrial districts are characterized by the agglomeration of medium and small-sized industries, localized within a certain geographic area with precise social and cultural c...
Mauro Dell'Orco, Raffaele Giordano
GECCO
2003
Springer
160views Optimization» more  GECCO 2003»
14 years 21 days ago
Using Genetic Algorithms for Data Mining Optimization in an Educational Web-Based System
This paper presents an approach for classifying students in order to predict their final grade based on features extracted from logged data in an education web-based system. A comb...
Behrouz Minaei-Bidgoli, William F. Punch