Sciweavers

2648 search results - page 275 / 530
» Human Factors In Computer Security
Sort
View
158
Voted
PAISI
2010
Springer
15 years 1 months ago
Efficient Privacy Preserving K-Means Clustering
Abstract. This paper introduces an efficient privacy-preserving protocol for distributed K-means clustering over an arbitrary partitioned data, shared among N parties. Clustering i...
Maneesh Upmanyu, Anoop M. Namboodiri, Kannan Srina...
189
Voted
EUROCRYPT
1999
Springer
15 years 8 months ago
Public-Key Cryptosystems Based on Composite Degree Residuosity Classes
Abstract. This paper investigates a novel computational problem, namely the Composite Residuosity Class Problem, and its applications to public-key cryptography. We propose a new t...
Pascal Paillier
126
Voted
ITICSE
2005
ACM
15 years 9 months ago
Teaching software engineering through game design
Many projects currently used in Software Engineering curricula lack both the “fun factor” needed to engage students, as well as the practical realism of engineering projects t...
Kajal T. Claypool, Mark Claypool
119
Voted
ACMSE
2008
ACM
15 years 5 months ago
Studio-based learning in CS2: an experience report
Recently there has been a surge of interest in making computer science education attractive to potential students, motivating to current students, and relevant to graduating stude...
Lakshman Myneni, Margaret Ross, T. Dean Hendrix, N...
AGENTS
2001
Springer
15 years 8 months ago
It knows what you're going to do: adding anticipation to a Quakebot
The complexity of AI characters in computer games is continually improving; however they still fall short of human players. In this paper we describe an AI bot for the game Quake ...
John E. Laird