Sciweavers

4650 search results - page 792 / 930
» Generating and evaluating evaluative arguments
Sort
View
136
Voted
ASIACRYPT
2009
Springer
15 years 8 months ago
Secure Multi-party Computation Minimizing Online Rounds
Multi-party secure computations are general important procedures to compute any function while keeping the security of private inputs. In this work we ask whether preprocessing can...
Seung Geol Choi, Ariel Elbaz, Tal Malkin, Moti Yun...
148
Voted
IMC
2009
ACM
15 years 8 months ago
Modeling user activities in a large IPTV system
Internet Protocol Television (IPTV) has emerged as a new delivery method for TV. In contrast with native broadcast in traditional cable and satellite TV system, video streams in I...
Tongqing Qiu, Zihui Ge, Seungjoon Lee, Jia Wang, J...
ICYCS
2008
IEEE
15 years 8 months ago
Sound-Specific Vibration Interface: Its Performance of Tactile Effects and Applications
The tactile effects of a sound-specific vibration interface is presented in this paper. The sound-specific vibration interface generates a vibration according to a sound stream us...
Yonghee You, Hwanmun Lee, Mee Young Sung, Kyungkoo...
ISBI
2008
IEEE
15 years 8 months ago
Automated gland and nuclei segmentation for grading of prostate and breast cancer histopathology
Automated detection and segmentation of nuclear and glandular structures is critical for classification and grading of prostate and breast cancer histopathology. In this paper, w...
Shivang Naik, Scott Doyle, Shannon Agner, Anant Ma...
SSDBM
2008
IEEE
149views Database» more  SSDBM 2008»
15 years 8 months ago
Query Planning for Searching Inter-dependent Deep-Web Databases
Increasingly, many data sources appear as online databases, hidden behind query forms, thus forming what is referred to as the deep web. It is desirable to have systems that can pr...
Fan Wang, Gagan Agrawal, Ruoming Jin