Sciweavers

1169 search results - page 143 / 234
» Two Ways to Common Knowledge
Sort
View
ICDM
2008
IEEE
130views Data Mining» more  ICDM 2008»
15 years 4 months ago
Inference Analysis in Privacy-Preserving Data Re-publishing
Privacy-Preserving Data Re-publishing (PPDR) deals with publishing microdata in dynamic scenarios. Due to privacy concerns, data must be disguised before being published. Research...
Guan Wang, Zutao Zhu, Wenliang Du, Zhouxuan Teng
ICIW
2008
IEEE
15 years 4 months ago
Graphical History List with Multi-window Support on a Mobile Web Browser
— Rolling back to previously visited Web pages and opening multiple browser windows or tabs at the same time are common activities in a Web browsing session on a PC. When using a...
Elina Vartiainen, Virpi Roto, Janne Kaasalainen
DATE
2007
IEEE
103views Hardware» more  DATE 2007»
15 years 4 months ago
Flexible hardware reduction for elliptic curve cryptography in GF(2m)
In this paper we discuss two ways to provide flexible hardware support for the reduction step in Elliptic Curve Cryptography in binary fields (GF(2m )). In our first approach w...
Steffen Peter, Peter Langendörfer, Krzysztof ...
HICSS
2007
IEEE
152views Biometrics» more  HICSS 2007»
15 years 4 months ago
Analyzing Online Information Privacy Concerns: An Information Processing Theory Approach
The advent of the Internet has made the transmission of personally identifiable information common and often inadvertent to the user. As a consequence, individuals worry that comp...
Il-Horn Hann, Kai Lung Hui, Sang-Yong Tom Lee, Iva...
CASC
2007
Springer
112views Mathematics» more  CASC 2007»
15 years 4 months ago
Polynomial Division Using Dynamic Arrays, Heaps, and Packed Exponent Vectors
A common way of implementing multivariate polynomial multiplication and division is to represent polynomials as linked lists of terms sorted in a term ordering and to use repeated ...
Michael B. Monagan, Roman Pearce