Sciweavers

3864 search results - page 689 / 773
» time 2005
Sort
View
148
Voted
TCC
2009
Springer
167views Cryptology» more  TCC 2009»
16 years 4 months ago
Simultaneous Hardcore Bits and Cryptography against Memory Attacks
This paper considers two questions in cryptography. Cryptography Secure Against Memory Attacks. A particularly devastating side-channel attack against cryptosystems, termed the &qu...
Adi Akavia, Shafi Goldwasser, Vinod Vaikuntanathan
147
Voted
KDD
2005
ACM
182views Data Mining» more  KDD 2005»
16 years 4 months ago
Making holistic schema matching robust: an ensemble approach
The Web has been rapidly "deepened" by myriad searchable databases online, where data are hidden behind query interfaces. As an essential task toward integrating these m...
Bin He, Kevin Chen-Chuan Chang
149
Voted
KDD
2005
ACM
192views Data Mining» more  KDD 2005»
16 years 4 months ago
Modeling and predicting personal information dissemination behavior
In this paper, we propose a new way to automatically model and predict human behavior of receiving and disseminating information by analyzing the contact and content of personal c...
Xiaodan Song, Ching-Yung Lin, Belle L. Tseng, Ming...
126
Voted
KDD
2005
ACM
185views Data Mining» more  KDD 2005»
16 years 4 months ago
Mining comparable bilingual text corpora for cross-language information integration
Integrating information in multiple natural languages is a challenging task that often requires manually created linguistic resources such as a bilingual dictionary or examples of...
Tao Tao, ChengXiang Zhai
111
Voted
CHI
2005
ACM
16 years 4 months ago
Studying the effectiveness of MOVE: a contextually optimized in-vehicle navigation system
In-vehicle navigation has changed substantially in recent years, due to the advent of computer generated maps and directions. However, these maps are still problematic, due to a m...
Joonhwan Lee, Jodi Forlizzi, Scott E. Hudson