Sciweavers

42388 search results - page 8205 / 8478
» Classification Using Information
Sort
View
IACR
2011
110views more  IACR 2011»
14 years 3 months ago
On the (In)security of Hash-based Oblivious RAM and a New Balancing Scheme
With the gaining popularity of remote storage (e.g. in the Cloud), we consider the setting where a small, protected local machine wishes to access data on a large, untrusted remot...
Eyal Kushilevitz, Steve Lu, Rafail Ostrovsky
PADL
2012
Springer
13 years 11 months ago
Typing the Numeric Tower
In the past, the creators of numerical programs had to choose between simple expression of mathematical formulas and static type checking. While the Lisp family and its dynamically...
Vincent St-Amour, Sam Tobin-Hochstadt, Matthew Fla...
WACV
2012
IEEE
13 years 11 months ago
Dynamic and invisible messaging for visual MIMO
The growing ubiquity of cameras in hand-held devices and the prevalence of electronic displays in signage creates a novel framework for wireless communications. Traditionally, the...
Wenjia Yuan, Kristin J. Dana, Ashwin Ashok, Marco ...
WSDM
2012
ACM
207views Data Mining» more  WSDM 2012»
13 years 11 months ago
Domain bias in web search
This paper uncovers a new phenomenon in web search that we call domain bias — a user’s propensity to believe that a page is more relevant just because it comes from a particul...
Samuel Ieong, Nina Mishra, Eldar Sadikov, Li Zhang
158
Voted
WSDM
2012
ACM
262views Data Mining» more  WSDM 2012»
13 years 11 months ago
Effects of user similarity in social media
There are many settings in which users of a social media application provide evaluations of one another. In a variety of domains, mechanisms for evaluation allow one user to say w...
Ashton Anderson, Daniel P. Huttenlocher, Jon M. Kl...
« Prev « First page 8205 / 8478 Last » Next »