Sciweavers

3735 search results - page 648 / 747
» Order compression schemes
Sort
View
CN
2008
100views more  CN 2008»
15 years 21 days ago
An efficient and secure event signature (EASES) protocol for peer-to-peer massively multiplayer online games
In recent years, massively multiplayer online games (MMOGs) have become very popular by providing more entertainment and sociability than single-player games. In order to prevent c...
Mo-Che Chan, Shun-Yun Hu, Jehn-Ruey Jiang
91
Voted
CORR
2008
Springer
166views Education» more  CORR 2008»
15 years 21 days ago
Information-Theoretically Secure Voting Without an Honest Majority
We present three voting protocols with unconditional privacy and information-theoretic correctness, without assuming any bound on the number of corrupt voters or voting authorities...
Anne Broadbent, Alain Tapp
CSL
2010
Springer
15 years 21 days ago
Improving supervised learning for meeting summarization using sampling and regression
Meeting summarization provides a concise and informative summary for the lengthy meetings and is an effective tool for efficient information access. In this paper, we focus on ext...
Shasha Xie, Yang Liu
82
Voted
DEBU
2010
104views more  DEBU 2010»
15 years 21 days ago
Query Results Ready, Now What?
A major hardness of processing searches issued in the form of keywords on structured data is the ambiguity problem. A set of keywords itself is not a complete piece of information...
Ziyang Liu, Yi Chen
EAAI
2008
136views more  EAAI 2008»
15 years 20 days ago
Adaptive fuzzy control of a non-linear servo-drive: Theory and experimental results
Adaptive fuzzy control has been an active research area over the last decade and several stable adaptive fuzzy controllers have been proposed in the literature. Such controllers a...
Domenico Bellomo, David Naso, Robert Babuska