Sciweavers

26354 search results - page 5166 / 5271
» How we refactor, and how we know it
Sort
View
SIGCSE
2012
ACM
282views Education» more  SIGCSE 2012»
13 years 9 months ago
Understanding the tenets of agile software engineering: lecturing, exploration and critical thinking
The use of agile principles and practices in software development is becoming a powerful force in today’s workplace. In our quest to develop better products, therefore, it is im...
Shvetha Soundararajan, Amine Chigani, James D. Art...
PKC
2012
Springer
255views Cryptology» more  PKC 2012»
13 years 4 months ago
Better Bootstrapping in Fully Homomorphic Encryption
Gentry’s bootstrapping technique is currently the only known method of obtaining a “pure” fully homomorphic encryption (FHE) schemes, and it may offers performance advantage...
Craig Gentry, Shai Halevi, Nigel P. Smart
SPAA
2012
ACM
13 years 4 months ago
Memory-mapping support for reducer hyperobjects
hyperobjects (reducers) provide a linguistic abstraction for dynamic multithreading that allows different branches of a parallel program to maintain coordinated local views of the...
I.-Ting Angelina Lee, Aamir Shafi, Charles E. Leis...
EDBT
2012
ACM
225views Database» more  EDBT 2012»
13 years 4 months ago
Differentially private search log sanitization with optimal output utility
Web search logs contain extremely sensitive data, as evidenced by the recent AOL incident. However, storing and analyzing search logs can be very useful for many purposes (i.e. in...
Yuan Hong, Jaideep Vaidya, Haibing Lu, Mingrui Wu
AAAI
2012
13 years 4 months ago
Emoticon Smoothed Language Models for Twitter Sentiment Analysis
Twitter sentiment analysis (TSA) has become a hot research topic in recent years. The goal of this task is to discover the attitude or opinion of the tweets, which is typically fo...
Kun-Lin Liu, Wu-Jun Li, Minyi Guo
« Prev « First page 5166 / 5271 Last » Next »