Sciweavers

7839 search results - page 1223 / 1568
» What's there and what's not
Sort
View
WOTE
2010
15 years 6 days ago
Receipt-Free K-out-of-L Voting Based on ElGamal Encryption
We present a K-out-of-L voting scheme, i.e., a voting scheme that allows every voter to vote for (up to) K candidates from a set of L candidates. The scheme is receipt-free, which ...
Martin Hirt
AAAI
2010
14 years 12 months ago
Cloning in Elections
We consider the problem of manipulating elections via cloning candidates. In our model, a manipulator can replace each candidate c by one or more clones, i.e., new candidates that...
Edith Elkind, Piotr Faliszewski, Arkadii M. Slinko
111
Voted
ACL
2010
14 years 12 months ago
A Rational Model of Eye Movement Control in Reading
A number of results in the study of realtime sentence comprehension have been explained by computational models as resulting from the rational use of probabilistic linguistic info...
Klinton Bicknell, Roger Levy
BIOSIG
2010
136views Biometrics» more  BIOSIG 2010»
14 years 12 months ago
User Survey on Phone Security and Usage
Abstract: Mobile phones are widely used nowadays and during the last years developed from simple phones to small computers with an increasing number of features. These result in a ...
Frank Breitinger, Claudia Nickel
CIKM
2010
Springer
14 years 12 months ago
Web search solved?: all result rankings the same?
The objective of this work is to derive quantitative statements about what fraction of web search queries issued to the state-of-the-art commercial search engines lead to excellen...
Hugo Zaragoza, Berkant Barla Cambazoglu, Ricardo A...
« Prev « First page 1223 / 1568 Last » Next »