Sciweavers

464 search results - page 65 / 93
» Enjoy the Paper: Lexicology
Sort
View
ACISP
2009
Springer
15 years 7 months ago
Building Key-Private Public-Key Encryption Schemes
In the setting of identity-based encryption with multiple trusted authorities, TA anonymity formally models the inability of an adversary to distinguish two ciphertexts correspondi...
Kenneth G. Paterson, Sriramkrishnan Srinivasan
114
Voted
AI
2009
Springer
15 years 7 months ago
Opinion Learning without Emotional Words
This paper shows that a detailed, although non-emotional, description of event or an action can be a reliable source for learning opinions. Empirical results show the practical uti...
Marina Sokolova, Guy Lapalme
AIED
2009
Springer
15 years 7 months ago
Scaffolding Motivation and Metacognition in Learning Programming
This paper explores the role that feedback based on past actions and motivational states of the learner can have in a motivationally and metacognitively aware Intelligent Tutoring ...
Alison Hull, Benedict du Boulay
117
Voted
AMMA
2009
Springer
15 years 7 months ago
Turing Trade: A Hybrid of a Turing Test and a Prediction Market
Abstract. We present Turing Trade, a web-based game that is a hybrid of a Turing test and a prediction market. In this game, there is a mystery conversation partner, the “target,...
Joseph Farfel, Vincent Conitzer
90
Voted
ASIACRYPT
2009
Springer
15 years 7 months ago
Memory Leakage-Resilient Encryption Based on Physically Unclonable Functions
Abstract. Physical attacks on cryptographic implementations and devices have become crucial. In this context a recent line of research on a new class of side-channel attacks, calle...
Frederik Armknecht, Roel Maes, Ahmad-Reza Sadeghi,...