Sciweavers

3509 search results - page 52 / 702
» Yours, Mine and Ours
Sort
View
CRYPTO
2003
Springer
87views Cryptology» more  CRYPTO 2003»
14 years 3 months ago
Private Circuits: Securing Hardware against Probing Attacks
Can you guarantee secrecy even if an adversary can eavesdrop on your brain? We consider the problem of protecting privacy in circuits, when faced with an adversary that can access ...
Yuval Ishai, Amit Sahai, David Wagner
HT
1997
ACM
14 years 2 months ago
Spatial Hypertext and the Practice of Information Triage
Information triage is the process of sorting through relevant materials, and organizing them to meet the needs of the task at hand. It is a practice that has become increasingly c...
Catherine C. Marshall, Frank M. Shipman III
ACL
1998
13 years 11 months ago
Dialogue Management in Vector-Based Call Routing
This paper describes a domain independent, automatically trained call router which directs customer calls based on their response to an open-ended "How may I direct your call...
Jennifer Chu-Carroll, Bob Carpenter
WSC
1998
13 years 11 months ago
The Value of Simulation in Modeling Supply Chains
In business today, re-engineering has taken a great deal of the cost out of internal corporate processes. Our factories and internal support organizations have become much more ef...
Ricki G. Ingalls
UAI
2000
13 years 11 months ago
Exploiting Qualitative Knowledge in the Learning of Conditional Probabilities of Bayesian Networks
Algorithms for learning the conditional probabilities of Bayesian networks with hidden variables typically operate within a high-dimensional search space and yield only locally op...
Frank Wittig, Anthony Jameson