Sciweavers

10182 search results - page 2032 / 2037
» Case Studies
Sort
View
CIKM
2011
Springer
13 years 11 months ago
Citation count prediction: learning to estimate future citations for literature
In most of the cases, scientists depend on previous literature which is relevant to their research fields for developing new ideas. However, it is not wise, nor possible, to trac...
Rui Yan, Jie Tang, Xiaobing Liu, Dongdong Shan, Xi...
CRYPTO
2011
Springer
235views Cryptology» more  CRYPTO 2011»
13 years 11 months ago
Better Security for Deterministic Public-Key Encryption: The Auxiliary-Input Setting
Deterministic public-key encryption, introduced by Bellare, Boldyreva, and O’Neill (CRYPTO ’07), provides an alternative to randomized public-key encryption in various scenari...
Zvika Brakerski, Gil Segev
DOCENG
2011
ACM
13 years 11 months ago
An exploratory analysis of mind maps
The results presented in this paper come from an exploratory study of 19,379 mind maps created by 11,179 users from the mind mapping applications ‘Docear’ and ‘MindMeister...
Jöran Beel, Stefan Langer
IACR
2011
87views more  IACR 2011»
13 years 11 months ago
Is privacy compatible with truthfulness?
In the area of privacy-preserving data mining, a differentially private mechanism intuitively encourages people to share their data truthfully because they are at little risk of ...
David Xiao
INFOCOM
2012
IEEE
13 years 2 months ago
DEAR: Delay-bounded Energy-constrained Adaptive Routing in wireless sensor networks
— Reliability and energy efficiency are critical issues in wireless sensor networks. In this work, we study Delay-bounded Energy-constrained Adaptive Routing (DEAR) problem with...
Shi Bai, Weiyi Zhang, Guoliang Xue, Jian Tang, Cho...
« Prev « First page 2032 / 2037 Last » Next »