Sciweavers

1560 search results - page 269 / 312
» Broadcasting with Side Information
Sort
View
CRYPTO
2010
Springer
170views Cryptology» more  CRYPTO 2010»
14 years 9 months ago
Securing Computation against Continuous Leakage
We present a general method to compile any cryptographic algorithm into one which resists side channel attacks of the only computation leaks information variety for an unbounded nu...
Shafi Goldwasser, Guy N. Rothblum
ACMDIS
2010
ACM
14 years 7 months ago
Human-to-dancer interaction: designing for embodied performances in a participatory installation
In this article we describe the creation and exhibit of a participatory installation performance. Graffiti Dance allows the audience to graffiti paint with light onto a buildings ...
David A. Shamma, Renata M. Sheppard, Jürgen S...
125
Voted
IAJIT
2011
14 years 7 months ago
Multilayer model for Arabic text compression
: This article describes a multilayer model-based approach for text compression. It uses linguistic information to develop a multilayer decomposition model of the text in order to ...
Arafat Awajan
102
Voted
EOR
2010
99views more  EOR 2010»
14 years 7 months ago
Expected gain-loss pricing and hedging of contingent claims in incomplete markets by linear programming
We analyze the problem of pricing and hedging contingent claims in the multi-period, discrete time, discrete state case using the concept of a sufficiently attractive expected gai...
Mustafa Ç. Pinar, Aslihan Salih, Ahmet Camc...
109
Voted
INTERSPEECH
2010
14 years 7 months ago
The relevance of timing, pauses and overlaps in dialogues: detecting topic changes in scenario based meetings
We present an investigation of the relevance of simple conversational features as indicators of topic shifts in small-group meetings. Three proposals for representation of dialogu...
Saturnino Luz, Jing Su