Sciweavers

1888 search results - page 378 / 378
» The Learning Power of Evolution
Sort
View
CRYPTO
2011
Springer
207views Cryptology» more  CRYPTO 2011»
12 years 5 months ago
Secure Computation on the Web: Computing without Simultaneous Interaction
Secure computation enables mutually suspicious parties to compute a joint function of their private inputs while providing strong security guarantees. Amongst other things, even i...
Shai Halevi, Yehuda Lindell, Benny Pinkas
SIGCSE
2012
ACM
282views Education» more  SIGCSE 2012»
12 years 1 months ago
Understanding the tenets of agile software engineering: lecturing, exploration and critical thinking
The use of agile principles and practices in software development is becoming a powerful force in today’s workplace. In our quest to develop better products, therefore, it is im...
Shvetha Soundararajan, Amine Chigani, James D. Art...
KDD
2012
ACM
199views Data Mining» more  KDD 2012»
11 years 8 months ago
Trustworthy online controlled experiments: five puzzling outcomes explained
Online controlled experiments are often utilized to make datadriven decisions at Amazon, Microsoft, eBay, Facebook, Google, Yahoo, Zynga, and at many other companies. While the th...
Ron Kohavi, Alex Deng, Brian Frasca, Roger Longbot...