Sciweavers

13277 search results - page 2563 / 2656
» An Approach to Clustering Abstracts
Sort
View
110
Voted
CRYPTO
2007
Springer
133views Cryptology» more  CRYPTO 2007»
15 years 6 months ago
On Secure Multi-party Computation in Black-Box Groups
Abstract. We study the natural problem of secure n-party computation (in the passive, computationally unbounded attack model) of the n-product function fG(x1, . . . , xn) = x1 · x...
Yvo Desmedt, Josef Pieprzyk, Ron Steinfeld, Huaxio...
DRM
2007
Springer
15 years 6 months ago
Slicing obfuscations: design, correctness, and evaluation
The goal of obfuscation is to transform a program, without affecting its functionality, such that some secret information within the program can be hidden for as long as possible...
Anirban Majumdar, Stephen Drape, Clark D. Thombors...
117
Voted
ECTEL
2007
Springer
15 years 6 months ago
Scruffy Technologies to Enable (Work-integrated) Learning
Abstract. The goal of the APOSDLE (Advanced Process-Oriented SelfDirected Learning environment) project is to support work-integrated learning of knowledge workers. We argue that w...
Stefanie N. Lindstaedt, Peter Scheir, Armin Ulbric...
119
Voted
ERCIMDL
2007
Springer
159views Education» more  ERCIMDL 2007»
15 years 6 months ago
Reducing Costs for Digitising Early Music with Dynamic Adaptation
Abstract. Optical music recognition (OMR) enables librarians to digitise early music sources on a large scale. The cost of expert human labour to correct automatic recognition erro...
Laurent Pugin, John Ashley Burgoyne, Ichiro Fujina...
87
Voted
ESWS
2007
Springer
15 years 6 months ago
Combining RDF Vocabularies for Expert Finding
Abstract. This paper presents a framework for the reuse and extension of existing, established vocabularies in the Semantic Web. Driven by the primary application of expert findin...
Boanerges Aleman-Meza, Uldis Bojars, Harold Boley,...
« Prev « First page 2563 / 2656 Last » Next »