Sciweavers

1519 search results - page 304 / 304
» What do they think
Sort
View
CRYPTO
2011
Springer
207views Cryptology» more  CRYPTO 2011»
12 years 5 months ago
Secure Computation on the Web: Computing without Simultaneous Interaction
Secure computation enables mutually suspicious parties to compute a joint function of their private inputs while providing strong security guarantees. Amongst other things, even i...
Shai Halevi, Yehuda Lindell, Benny Pinkas
KDD
2012
ACM
217views Data Mining» more  KDD 2012»
11 years 8 months ago
Cross-domain collaboration recommendation
Interdisciplinary collaborations have generated huge impact to society. However, it is often hard for researchers to establish such cross-domain collaborations. What are the patte...
Jie Tang, Sen Wu, Jimeng Sun, Hang Su
ICSE
2012
IEEE-ACM
11 years 8 months ago
Characterizing logging practices in open-source software
—Software logging is a conventional programming practice. While its efficacy is often important for users and developers to understand what have happened in the production run, ...
Ding Yuan, Soyeon Park, Yuanyuan Zhou
DRUMS
1998
Springer
13 years 9 months ago
Handling uncertainty in control of autonomous robots
Autonomous robots need the ability to move purposefully and without human intervention in real-world environments that have not been speci cally engineered for them. These environm...
Alessandro Saffiotti