Sciweavers

2440 search results - page 180 / 488
» Data-Intensive Question Answering
Sort
View
ISIP
2008
IEEE
15 years 10 months ago
An Approach Towards the Integration of Adaptive Business Intelligent and Constraint Programming
Adaptive Business Intelligence is the discipline that combines prediction, optimization and adaptability into a system answering two important questions: What would probably happe...
José Miguel Rubio, Broderick Crawford
HICSS
2007
IEEE
130views Biometrics» more  HICSS 2007»
15 years 10 months ago
Analysis of Activity in the Open Source Software Development Community
— Open Source Software is computer software for which the source code is publicly open for inspection, modification, and redistribution. While research of a few, large, successf...
Scott Christley, Gregory R. Madey
AGILE
2007
Springer
803views GIS» more  AGILE 2007»
15 years 10 months ago
Increasing the Fitness of OGC-Compliant Web Map Services for the Web 2.0
Google Maps and Google Earth are very popular web mapping services but they are not open and not OGC-compliant. The question arises why this is not the case. One reason is that com...
Thomas Brinkhoff
CRYPTO
2007
Springer
154views Cryptology» more  CRYPTO 2007»
15 years 10 months ago
A Polynomial Time Attack on RSA with Private CRT-Exponents Smaller Than N 0.073
Wiener’s famous attack on RSA with d < N0.25 shows that using a small d for an efficient decryption process makes RSA completely insecure. As an alternative, Wiener proposed t...
Ellen Jochemsz, Alexander May
TCC
2007
Springer
112views Cryptology» more  TCC 2007»
15 years 10 months ago
On the Necessity of Rewinding in Secure Multiparty Computation
We investigate whether security of multiparty computation in the information-theoretic setting implies their security under concurrent composition. We show that security in the sta...
Michael Backes, Jörn Müller-Quade, Domin...