Sciweavers

359 search results - page 49 / 72
» What to Do About Microsoft
Sort
View
EUROCRYPT
1997
Springer
15 years 1 months ago
Oblivious Transfers and Privacy Amplification
Oblivious transfer (OT) is an important primitive in cryptography. In chosen one-out-of-two string OT, a sender offers two strings, one of which the other party, called the receive...
Gilles Brassard, Claude Crépeau
CACM
2008
101views more  CACM 2008»
14 years 9 months ago
Just say 'A Class Defines a Data Type'
data type and (Java) class, asking about the relationship between them. The same students would also be unlikely to find an answer in a CS1 textbook. Some textbooks might not even ...
Chenglie Hu
WWW
2008
ACM
15 years 10 months ago
Emergence of terminological conventions as an author-searcher coordination game
All information exchange on the Internet ? whether through full text, controlled vocabularies, ontologies, or other mechanisms ? ultimately requires that that an information provi...
David Bodoff, Sheizaf Rafaeli
KDD
2009
ACM
150views Data Mining» more  KDD 2009»
15 years 10 months ago
Large human communication networks: patterns and a utility-driven generator
Given a real, and weighted person-to-person network which changes over time, what can we say about the cliques that it contains? Do the incidents of communication, or weights on t...
Nan Du, Christos Faloutsos, Bai Wang, Leman Akoglu
CHI
2008
ACM
15 years 10 months ago
Sustainable millennials: attitudes towards sustainability and the material effects of interactive technologies
This paper describes the design and interprets the results of a survey of 435 undergraduate students concerning the attitudes of this mainly millennial population towards sustaina...
Kristin Hanks, William Odom, David Roedl, Eli Blev...