Sciweavers

24680 search results - page 4659 / 4936
» Learning
Sort
View
75
Voted
CHI
2009
ACM
16 years 1 months ago
Designing for and with diaspora: a case study of work for the truth and reconciliation commission of liberia
We describe our experiences in designing new media technologies in cooperation with Liberia's Truth and Reconciliation Commission. This work includes two major projects: a dy...
Michael L. Best, Thomas N. Smyth, Daniel Serrano-B...
90
Voted
SIGCSE
2009
ACM
139views Education» more  SIGCSE 2009»
16 years 1 months ago
Abstraction and extensibility in digital logic simulation software
ion and Extensibility in Digital Logic Simulation Software Richard M. Salter and John L. Donaldson Computer Science Department Oberlin College Oberlin, OH 44074 rms@cs.oberlin.edu,...
Richard M. Salter, John L. Donaldson
144
Voted
CICLING
2009
Springer
16 years 1 months ago
Cross-Language Frame Semantics Transfer in Bilingual Corpora
Recent work on the transfer of semantic information across languages has been recently applied to the development of resources annotated with Frame information for different non-En...
Roberto Basili, Diego De Cao, Danilo Croce, Bonave...
105
Voted
HPCA
2009
IEEE
16 years 1 months ago
Adaptive Spill-Receive for robust high-performance caching in CMPs
In a Chip Multi-Processor (CMP) with private caches, the last level cache is statically partitioned between all the cores. This prevents such CMPs from sharing cache capacity in r...
Moinuddin K. Qureshi
116
Voted
PKC
2009
Springer
210views Cryptology» more  PKC 2009»
16 years 1 months ago
Controlling Access to an Oblivious Database Using Stateful Anonymous Credentials
In this work, we consider the task of allowing a content provider to enforce complex access control policies on oblivious protocols conducted with anonymous users. As our primary ...
Scott E. Coull, Matthew Green, Susan Hohenberger
« Prev « First page 4659 / 4936 Last » Next »