Sciweavers

24188 search results - page 4832 / 4838
» Computing on Encrypted Data
Sort
View
OIR
2011
401views Neural Networks» more  OIR 2011»
14 years 21 days ago
Using Online Collaborative Tools for Groups to Co-Construct Knowledge
(limit 250 words) Purpose This paper reports and describes the use of MediaWiki and Google Docs at undergraduate level as online collaboration tools for co-constructing knowledge i...
Sam Kai Wah Chu, David M. Kennedy
PKC
2011
Springer
219views Cryptology» more  PKC 2011»
14 years 21 days ago
Linearly Homomorphic Signatures over Binary Fields and New Tools for Lattice-Based Signatures
ded abstract of this work appears in Public Key Cryptography — PKC 2011, ed. R. Gennaro, Springer LNCS 6571 (2011), 1–16. This is the full version. We propose a linearly homom...
Dan Boneh, David Mandell Freeman
POPL
2011
ACM
14 years 21 days ago
Safe nondeterminism in a deterministic-by-default parallel language
A number of deterministic parallel programming models with strong safety guarantees are emerging, but similar support for nondeterministic algorithms, such as branch and bound sea...
Robert L. Bocchino Jr., Stephen Heumann, Nima Hona...
SCIENTOMETRICS
2011
14 years 20 days ago
Effect on the journal impact factor of the number and document type of citing records: a wide-scale study
Abstract We studied the effect on journal impact factors (JIF) of citations from documents labeled as articles and reviews (usually peer reviewed) versus citations coming from othe...
Juan Miguel Campanario, Jesús Carretero, Ve...
SIGIR
2011
ACM
14 years 20 days ago
Learning search tasks in queries and web pages via graph regularization
As the Internet grows explosively, search engines play a more and more important role for users in effectively accessing online information. Recently, it has been recognized that ...
Ming Ji, Jun Yan, Siyu Gu, Jiawei Han, Xiaofei He,...
« Prev « First page 4832 / 4838 Last » Next »