Sciweavers

5414 search results - page 936 / 1083
» Exploratory Model Building
Sort
View
CRYPTO
2010
Springer
145views Cryptology» more  CRYPTO 2010»
15 years 3 months ago
Protocols for Multiparty Coin Toss with Dishonest Majority
Coin-tossing protocols are protocols that generate a random bit with uniform distribution. These protocols are used as a building block in many cryptographic protocols. Cleve [STOC...
Amos Beimel, Eran Omri, Ilan Orlov
DASFAA
2010
IEEE
176views Database» more  DASFAA 2010»
15 years 3 months ago
Efficient Database-Driven Evaluation of Security Clearance for Federated Access Control of Dynamic XML Documents
Achieving data security over cooperating web services is becoming a reality, but existing XML access control architectures do not consider this federated service computing. In this...
Erwin Leonardi, Sourav S. Bhowmick, Mizuho Iwaihar...
ICPR
2010
IEEE
15 years 3 months ago
Concensus of Self-features for Nonverbal Behavior Analysis
Abstract. One of the key challenge in social behavior analysis is to automatically discover the subset of features relevant to a specific social signal (e.g., backchannel feedback...
Derya Ozkan, Louis-Philippe Morency
SIGCSE
2010
ACM
181views Education» more  SIGCSE 2010»
15 years 3 months ago
Internationalization of computer science education
Internationalization of computer science education involves incorporating awareness, knowledge and skills of professional life in a global environment. Through an NSF CPATH grant1...
Sarah A. Douglas, Arthur M. Farley, Ginnie Lo, And...
120
Voted
ANOR
2008
123views more  ANOR 2008»
15 years 3 months ago
An approach to predictive-reactive scheduling of parallel machines subject to disruptions
: In this paper, a new predictive-reactive approach to a parallel machine scheduling problem in the presence of uncertain disruptions is presented. The approach developed is based ...
Alejandra Duenas, Dobrila Petrovic