Sciweavers

14382 search results - page 2715 / 2877
» Time in Connectionist Models
Sort
View
CRYPTO
2011
Springer
243views Cryptology» more  CRYPTO 2011»
14 years 3 months ago
Memory Delegation
We consider the problem of delegating computation, where the delegator doesn’t even know the input to the function being delegated, and runs in time significantly smaller than ...
Kai-Min Chung, Yael Tauman Kalai, Feng-Hao Liu, Ra...
EDM
2011
197views Data Mining» more  EDM 2011»
14 years 3 months ago
Towards Improvements on Domain-independent Measurements for Collaborative Assessment
Assessment on collaborative student behavior is a longstanding issue in user modeling. Nowadays thanks to the proliferation of online learning and the vast amount of data on studen...
Antonio R. Anaya, Jesus Boticario
160
Voted
IACR
2011
88views more  IACR 2011»
14 years 3 months ago
Storing Secrets on Continually Leaky Devices
We consider the question of how to store a value secretly on devices that continually leak information about their internal state to an external attacker. If the secret value is s...
Yevgeniy Dodis, Allison B. Lewko, Brent Waters, Da...
175
Voted
WWW
2009
ACM
16 years 4 months ago
Collaborative filtering for orkut communities: discovery of user latent behavior
Users of social networking services can connect with each other by forming communities for online interaction. Yet as the number of communities hosted by such websites grows over ...
WenYen Chen, Jon-Chyuan Chu, Junyi Luan, Hongjie B...
ASIACRYPT
2003
Springer
15 years 8 months ago
Incremental Multiset Hash Functions and Their Application to Memory Integrity Checking
We introduce a new cryptographic tool: multiset hash functions. Unlike standard hash functions which take strings as input, multiset hash functions operate on multisets (or sets). ...
Dwaine E. Clarke, Srinivas Devadas, Marten van Dij...
« Prev « First page 2715 / 2877 Last » Next »