Sciweavers

2560 search results - page 216 / 512
» Contributions to zero-sum problems
Sort
View
78
Voted
TCC
2005
Springer
102views Cryptology» more  TCC 2005»
15 years 6 months ago
Toward Privacy in Public Databases
Abstract. We initiate a theoretical study of the census problem. Informally, in a census individual respondents give private information to a trusted party (the census bureau), who...
Shuchi Chawla, Cynthia Dwork, Frank McSherry, Adam...
102
Voted
WAIM
2005
Springer
15 years 6 months ago
An Algebraic Framework for Schema Matching
It is well known that a formal framework for the schema matching problem (SMP) is important because it facilitates the building of algorithm model and the evaluation of algorithms....
Zhi Zhang, Haoyang Che, Pengfei Shi, Yong Sun, Jun...
96
Voted
IUI
2004
ACM
15 years 6 months ago
SUPPLE: automatically generating user interfaces
In order to give people ubiquitous access to software applications, device controllers, and Internet services, it will be necessary to automatically adapt user interfaces to the c...
Krzysztof Gajos, Daniel S. Weld
92
Voted
PDC
2004
ACM
15 years 6 months ago
Personas is not applicable: local remedies interpreted in a wider context
One of the major problems with participatory design is that it is extremely difficult to apply it to current developments. Software development for the mass market is one aspect o...
Kari Rönkkö, Mats Hellman, Britta Kiland...
CRYPTO
2003
Springer
96views Cryptology» more  CRYPTO 2003»
15 years 6 months ago
Scalable Protocols for Authenticated Group Key Exchange
We consider the fundamental problem of authenticated group key exchange among n parties within a larger and insecure public network. A number of solutions to this problem have bee...
Jonathan Katz, Moti Yung