Sciweavers

5372 search results - page 321 / 1075
» complexity 2007
Sort
View
108
Voted
ADC
2007
Springer
150views Database» more  ADC 2007»
15 years 8 months ago
Beyond Purpose-Based Privacy Access Control
Research efforts have been directed toward the improvement of privacy protecting technology by incorporating privacy protection into database systems. Purpose acts as a central co...
Sabah S. Al-Fedaghi
150
Voted
AI
2007
Springer
15 years 8 months ago
Multiagent Constraint Satisfaction with Multiply Sectioned Constraint Networks
Abstract. Variables and constraints in problem domains are often distributed. These distributed constraint satisfaction problems (DCSPs) lend themselves to multiagent solutions. Mo...
Yang Xiang, Wanling Zhang
122
Voted
AIED
2007
Springer
15 years 8 months ago
Effect of Metacognitive Support on Student Behaviors in Learning by Teaching Environments
We have developed environments that use teaching as a metacognitive, reflective, and iterative process to help middle school students learn about complex processes. We demonstrate ...
Jason Tan, John Wagster, Yanna Wu, Gautam Biswas
124
Voted
ASIACRYPT
2007
Springer
15 years 8 months ago
A Key Recovery Attack on Edon80
Edon80 is a recent stream cipher design that has advanced to the third and last phase of the eSTREAM project. It has remained unbroken and untweaked since it was designed and submi...
Martin Hell, Thomas Johansson
119
Voted
ASIACRYPT
2007
Springer
15 years 8 months ago
Multi-party Indirect Indexing and Applications
Abstract. We develop a new multi-party generalization of Naor-Nissim indirect indexing, making it possible for many participants to simulate a RAM machine with only poly-logarithmi...
Matthew K. Franklin, Mark Gondree, Payman Mohassel