Sciweavers

6599 search results - page 1138 / 1320
» Towards a Theory of Information
Sort
View
71
Voted
DCC
2005
IEEE
15 years 9 months ago
Highly Nonlinear Resilient Functions Through Disjoint Codes in Projective Spaces
Functions which map n-bits to m-bits are important cryptographic sub-primitives in the design of additive stream ciphers. We construct highly nonlinear t-resilient such functions (...
Pascale Charpin, Enes Pasalic
WSDM
2010
ACM
215views Data Mining» more  WSDM 2010»
15 years 7 months ago
GeoFolk: Latent spatial semantics in Web 2.0 social media
We describe an approach for multi-modal characterization of social media by combining text features (e.g. tags as a prominent example of short, unstructured text labels) with spat...
Sergej Sizov
89
Voted
SOFSEM
2009
Springer
15 years 7 months ago
When Analysis Fails: Heuristic Mechanism Design via Self-correcting Procedures
Abstract. Computational mechanism design (CMD) seeks to understand how to design game forms that induce desirable outcomes in multiagent systems despite private information, self-i...
David C. Parkes
92
Voted
TLDI
2010
ACM
218views Formal Methods» more  TLDI 2010»
15 years 7 months ago
Pointwise generalized algebraic data types
In the GADT (Generalized Algebraic Data Types) type system, a pattern-matching branch can draw type information from both the scrutinee type and the data constructor type. Even th...
Chuan-kai Lin, Tim Sheard
67
Voted
CSCW
2010
ACM
15 years 7 months ago
"on my way": deceptive texting and interpersonal awareness narratives
Managing one’s availability for interaction with others is an increasingly complex act, involving multiple media and the sharing of many types of information. In this paper we d...
Jeremy P. Birnholtz, Jamie Guillory, Jeffrey T. Ha...
« Prev « First page 1138 / 1320 Last » Next »