Sciweavers

2056 search results - page 397 / 412
» time 2000
Sort
View
STOC
2000
ACM
137views Algorithms» more  STOC 2000»
14 years 1 months ago
On the complexity of verifiable secret sharing and multiparty computation
We first study the problem of doing Verifiable Secret Sharing (VSS) information theoretically secure for a general access structure. We do it in the model where private channels b...
Ronald Cramer, Ivan Damgård, Stefan Dziembow...
VLDB
2000
ACM
133views Database» more  VLDB 2000»
14 years 1 months ago
Memex: A Browsing Assistant for Collaborative Archiving and Mining of Surf Trails
Keyword indices, topic directories, and link-based rankings are used to search and structure the rapidly growing Web today. Surprisingly little use is made of years of browsing ex...
Soumen Chakrabarti, Sandeep Srivastava, Mallela Su...
AAAI
2007
14 years 5 days ago
The VITA Financial Services Sales Support Environment
Knowledge-based recommender technologies support customers and sales representatives in the identification of appropriate products and services. These technologies are especially ...
Alexander Felfernig, Klaus Isak, Kalman Szabo, Pet...
WSC
2007
14 years 5 days ago
Fundamentals of simulation modeling
We start with basic terminology and concepts of modeling, and decompose the art of modeling as a process. This overview of the process helps clarify when we should or should not u...
Paul J. Sánchez
ASPLOS
2008
ACM
13 years 12 months ago
Dispersing proprietary applications as benchmarks through code mutation
Industry vendors hesitate to disseminate proprietary applications to academia and third party vendors. By consequence, the benchmarking process is typically driven by standardized...
Luk Van Ertvelde, Lieven Eeckhout