Sciweavers

2663 search results - page 115 / 533
» The Design, Implementation, and Evaluation of Jade
Sort
View
ACSAC
2009
IEEE
15 years 4 months ago
Privacy through Noise: A Design Space for Private Identification
To protect privacy in large systems, users must be able to authenticate against a central server without disclosing their identity to the network. Private identification protocols ...
Karsten Nohl, David Evans
ENTCS
2007
122views more  ENTCS 2007»
14 years 10 months ago
Plugging a Space Leak with an Arrow
The implementation of conceptually continuous signals in functional reactive programming (FRP) is studied in detail. We show that recursive signals in standard implementations usi...
Hai Liu, Paul Hudak
IDEAS
2007
IEEE
135views Database» more  IDEAS 2007»
15 years 4 months ago
Bitmap Index Design Choices and Their Performance Implications
Historically, bitmap indexing has provided an important database capability to accelerate queries. However, only a few database systems have implemented these indexes because of t...
Elizabeth J. O'Neil, Patrick E. O'Neil, Kesheng Wu
IJAMC
2008
99views more  IJAMC 2008»
14 years 10 months ago
Improving Educational Multimedia selection process using group decision support systems
Educational Multimedia (EMM) is becoming a mature and integral part of teaching and learning systems, mainly due to its ability improve teaching and learning. However, EMM selecti...
Mohammed N. A. Abdelhakim, Shervin Shirmohammadi
LREC
2010
107views Education» more  LREC 2010»
14 years 11 months ago
Is my Judge a good One?
This paper aims at measuring the reliability of judges in MT evaluation. The scope is two evaluation campaigns from the CESTA project, during which human evaluations were carried ...
Olivier Hamon