Sciweavers

16606 search results - page 3210 / 3322
» Context Modeling: Task Model and Practice Model
Sort
View
123
Voted
SIGMOD
2005
ACM
126views Database» more  SIGMOD 2005»
15 years 9 months ago
Page Quality: In Search of an Unbiased Web Ranking
In a number of recent studies [4, 8] researchers have found that because search engines repeatedly return currently popular pages at the top of search results, popular pages tend ...
Junghoo Cho, Sourashis Roy, Robert Adams
140
Voted
VRST
2005
ACM
15 years 9 months ago
Artistic reality: fast brush stroke stylization for augmented reality
The goal of augmented reality is to provide the user with a view of the surroundings enriched by virtual objects. Practically all augmented reality systems rely on standard realti...
Jan Fischer, Dirk Bartz, Wolfgang Straßer
122
Voted
ACNS
2005
Springer
84views Cryptology» more  ACNS 2005»
15 years 9 months ago
Non-interactive Zero-Knowledge Arguments for Voting
Abstract. In voting based on homomorphic threshold encryption, the voter encrypts his vote and sends it in to the authorities that tally the votes. If voters can send in arbitrary ...
Jens Groth
175
Voted
CAV
2005
Springer
150views Hardware» more  CAV 2005»
15 years 9 months ago
Reasoning About Threads Communicating via Locks
Abstract. We propose a new technique for the static analysis of concurrent programs comprised of multiple threads. In general, the problem is known to be undecidable even for progr...
Vineet Kahlon, Franjo Ivancic, Aarti Gupta
127
Voted
CCS
2005
ACM
15 years 9 months ago
On deriving unknown vulnerabilities from zero-day polymorphic and metamorphic worm exploits
Vulnerabilities that allow worms to hijack the control flow of each host that they spread to are typically discovered months before the worm outbreak, but are also typically disc...
Jedidiah R. Crandall, Zhendong Su, Shyhtsun Felix ...
« Prev « First page 3210 / 3322 Last » Next »