Sciweavers

2835 search results - page 215 / 567
» Automatic Question Answering
Sort
View
HICSS
2007
IEEE
130views Biometrics» more  HICSS 2007»
15 years 11 months ago
Analysis of Activity in the Open Source Software Development Community
— Open Source Software is computer software for which the source code is publicly open for inspection, modification, and redistribution. While research of a few, large, successf...
Scott Christley, Gregory R. Madey
AGILE
2007
Springer
803views GIS» more  AGILE 2007»
15 years 11 months ago
Increasing the Fitness of OGC-Compliant Web Map Services for the Web 2.0
Google Maps and Google Earth are very popular web mapping services but they are not open and not OGC-compliant. The question arises why this is not the case. One reason is that com...
Thomas Brinkhoff
106
Voted
CRYPTO
2007
Springer
154views Cryptology» more  CRYPTO 2007»
15 years 11 months ago
A Polynomial Time Attack on RSA with Private CRT-Exponents Smaller Than N 0.073
Wiener’s famous attack on RSA with d < N0.25 shows that using a small d for an efficient decryption process makes RSA completely insecure. As an alternative, Wiener proposed t...
Ellen Jochemsz, Alexander May
TCC
2007
Springer
112views Cryptology» more  TCC 2007»
15 years 11 months ago
On the Necessity of Rewinding in Secure Multiparty Computation
We investigate whether security of multiparty computation in the information-theoretic setting implies their security under concurrent composition. We show that security in the sta...
Michael Backes, Jörn Müller-Quade, Domin...
117
Voted
WAIFI
2007
Springer
122views Mathematics» more  WAIFI 2007»
15 years 11 months ago
The Simplest Method for Constructing APN Polynomials EA-Inequivalent to Power Functions
The first APN polynomials EA-inequivalent to power functions have been constructed in [7, 8] by applying CCZ-equivalence to the Gold APN functions. It is a natural question wheth...
Lilya Budaghyan