Sciweavers

897 search results - page 126 / 180
» Identity: How to name it, How to find it
Sort
View
DCC
2005
IEEE
16 years 1 months ago
Highly Nonlinear Resilient Functions Through Disjoint Codes in Projective Spaces
Functions which map n-bits to m-bits are important cryptographic sub-primitives in the design of additive stream ciphers. We construct highly nonlinear t-resilient such functions (...
Pascale Charpin, Enes Pasalic
IUI
2009
ACM
15 years 10 months ago
Rich interfaces for reading news on the web
Using content-specific models to guide information retrieval and extraction can provide richer interfaces to endusers for both understanding the context of news events and navigat...
Earl J. Wagner, Jiahui Liu, Larry Birnbaum, Kennet...
HICSS
2010
IEEE
235views Biometrics» more  HICSS 2010»
15 years 8 months ago
Knowledge Sourcing from Repositories: The Role of System Characteristics and Autonomy
Organizations invest in the development of knowledge repositories (KR) to foster knowledge reuse and integration. Yet many KR initiatives fail to meet expectations, in part becaus...
Alexandra Durcikova, Kelly J. Fadel
HT
2009
ACM
15 years 8 months ago
Weblog as a personal thinking space
While weblogs have been conceptualised as personal thinking spaces since their early days, those uses have not been studied in detail. The purpose of this paper is to explore how ...
Lilia Efimova
SIGIR
2009
ACM
15 years 8 months ago
When more is less: the paradox of choice in search engine use
In numerous everyday domains, it has been demonstrated that increasing the number of options beyond a handful can lead to paralysis and poor choice and decrease satisfaction with ...
Antti Oulasvirta, Janne P. Hukkinen, Barry Schwart...