Sciweavers

241 search results - page 22 / 49
» Recommendation to Groups
Sort
View
POST
2012
181views more  POST 2012»
13 years 7 months ago
Provably Repairing the ISO/IEC 9798 Standard for Entity Authentication
Abstract. We formally analyze the family of entity authentication protocols defined by the ISO/IEC 9798 standard and find numerous weaknesses, both old and new, including some th...
David A. Basin, Cas J. F. Cremers, Simon Meier
AIED
2009
Springer
15 years 6 months ago
Will Google destroy western democracy? Bias in policy problem solving
: Democracy requires students to choose policy positions based on evidence, yet confirmation bias prevents them from doing so. As a preliminary step in building a policy reasoning ...
Matthew W. Easterday, Vincent Aleven, Richard Sche...
IRAL
2003
ACM
15 years 5 months ago
An approach for combining content-based and collaborative filters
In this work, we apply a clustering technique to integrate the contents of items into the item-based collaborative filtering framework. The group rating information that is obtain...
Qing Li, Byeong Man Kim
ACISP
2010
Springer
15 years 1 months ago
Security Estimates for Quadratic Field Based Cryptosystems
Abstract. We describe implementations for solving the discrete logarithm problem in the class group of an imaginary quadratic field and in the infrastructure of a real quadratic fi...
Jean-François Biasse, Michael J. Jacobson, ...
APVIS
2006
15 years 1 months ago
How people read sociograms: a questionnaire study
Visualizing social network data into sociograms plays an important role in communicating information about network characteristics. Previous studies have shown that human percepti...
Weidong Huang, Seok-Hee Hong, Peter Eades