Sciweavers

2066 search results - page 405 / 414
» Word Maturity: Computational Modeling of Word Knowledge
Sort
View
PKC
2009
Springer
116views Cryptology» more  PKC 2009»
14 years 9 months ago
Improving the Boneh-Franklin Traitor Tracing Scheme
Abstract. Traitor tracing schemes are cryptographically secure broadcast methods that allow identification of conspirators: if a pirate key is generated by k traitors out of a stat...
Pascal Junod, Alexandre Karlov, Arjen K. Lenstra
STOC
2004
ACM
152views Algorithms» more  STOC 2004»
14 years 9 months ago
Exponential separation of quantum and classical one-way communication complexity
Abstract. We give the first exponential separation between quantum and bounded-error randomized one-way communication complexity. Specifically, we define the Hidden Matching Proble...
Ziv Bar-Yossef, T. S. Jayram, Iordanis Kerenidis
WWW
2010
ACM
14 years 4 months ago
Earthquake shakes Twitter users: real-time event detection by social sensors
Twitter, a popular microblogging service, has received much attention recently. An important characteristic of Twitter is its real-time nature. For example, when an earthquake occ...
Takeshi Sakaki, Makoto Okazaki, Yutaka Matsuo
EDBT
2009
ACM
222views Database» more  EDBT 2009»
14 years 3 months ago
Data clouds: summarizing keyword search results over structured data
Keyword searches are attractive because they facilitate users searching structured databases. On the other hand, tag clouds are popular for navigation and visualization purposes o...
Georgia Koutrika, Zahra Mohammadi Zadeh, Hector Ga...
ACCESSNETS
2008
Springer
14 years 3 months ago
A Simulator of Periodically Switching Channels for Power Line Communications
An indoor power line is one of the most attractive media for in-home networks. However, there are many technical problems for achieving in-home power line communication (PLC) with ...
Taro Hayasaki, Daisuke Umehara, Satoshi Denno, Mas...