Sciweavers

796 search results - page 99 / 160
» Generalized Commitment Alignment
Sort
View
TIT
2011
120views more  TIT 2011»
14 years 7 months ago
The Secrecy Capacity Region of the Gaussian MIMO Multi-Receiver Wiretap Channel
In this paper, we consider the Gaussian multiple-input multiple-output (MIMO) multi-receiver wiretap channel in which a transmitter wants to have confidential communication with ...
Ersen Ekrem, Sennur Ulukus
93
Voted
TCC
2009
Springer
117views Cryptology» more  TCC 2009»
16 years 1 months ago
Towards a Theory of Extractable Functions
Extractable functions are functions where any adversary that outputs a point in the range of the function is guaranteed to "know" a corresponding preimage. Here, knowledg...
Ran Canetti, Ronny Ramzi Dakdouk
89
Voted
CHI
2005
ACM
16 years 1 months ago
Towards knowledge building in professional groups
In this submission for the CHI05 Development forum, I reflect on my experience leading the Experience Design community of interest of the American Institute of Graphic Arts and su...
John Zapolski
KBSE
2007
IEEE
15 years 7 months ago
Towards supporting awareness of indirect conflicts across software configuration management workspaces
Workspace awareness techniques have been proposed to enhance the effectiveness of software configuration management systems in coordinating parallel work. These techniques share i...
Anita Sarma, Gerald Bortis, André van der H...
MSR
2005
ACM
15 years 6 months ago
Software repository mining with Marmoset: an automated programming project snapshot and testing system
Most computer science educators hold strong opinions about the “right” approach to teaching introductory level programming. Unfortunately, we have comparatively little hard ev...
Jaime Spacco, Jaymie Strecker, David Hovemeyer, Wi...