Sciweavers

3570 search results - page 32 / 714
» A User Model for Information Erasure
Sort
View
CORR
2010
Springer
67views Education» more  CORR 2010»
14 years 9 months ago
Rate Regions of Secret Key Sharing in a New Source Model
A source model for secret key generation between terminals is considered. Two users, namely users 1 and 2, at one side communicate with another user, namely user 3, at the other si...
Somayeh Salimi, Mahmoud Salmasizadeh, Mohammad Rez...
IV
2002
IEEE
162views Visualization» more  IV 2002»
15 years 2 months ago
Infoticles: Information Modeling in Immersive Environments
This paper introduces an immersive virtual reality application that allows users to browse and explore the contents of database systems. We have implemented a visualization metaph...
Andrew Vande Moere
CORR
2011
Springer
243views Education» more  CORR 2011»
14 years 4 months ago
Deterministic Network Model Revisited: An Algebraic Network Coding Approach
Abstract—The capacity of multiuser networks has been a longstanding problem in information theory. Recently, Avestimehr et al. have proposed a deterministic network model to appr...
MinJi Kim, Elona Erez, Edmund M. Yeh, Muriel M&eac...
86
Voted
SP
2002
IEEE
140views Security Privacy» more  SP 2002»
14 years 9 months ago
Efficient Multicast Packet Authentication Using Signature Amortization
We describe a novel method for authenticating multicast packets that is robust against packet loss. Our main focus is to minimize the size of the communication overhead required t...
Jung Min Park, Edwin K. P. Chong, Howard Jay Siege...
116
Voted
SIGIR
2011
ACM
14 years 8 days ago
Collaborative competitive filtering: learning recommender using context of user choice
While a user’s preference is directly reflected in the interactive choice process between her and the recommender, this wealth of information was not fully exploited for learni...
Shuang-Hong Yang, Bo Long, Alexander J. Smola, Hon...