Sciweavers

5410 search results - page 988 / 1082
» When to Cross Over
Sort
View
94
Voted
FPCA
1989
15 years 4 months ago
Theorems for Free!
Parametric polymorphism constrains the behavior of pure functional programs in a way that allows the derivation of interesting theorems about them solely from their types, i.e., v...
Philip Wadler
80
Voted
ACMICEC
2007
ACM
115views ECommerce» more  ACMICEC 2007»
15 years 4 months ago
An economic model of portal competition under privacy concerns
Due to inherent privacy concerns, online personalization services such as those offered through toolbars and desktop widgets are characterized by "no-free-disposal" (NFD...
Ramnath K. Chellappa, Raymond G. Sin
AFRICACRYPT
2009
Springer
15 years 4 months ago
Certified Encryption Revisited
The notion of certified encryption had recently been suggested as a suitable setting for analyzing the security of encryption against adversaries that tamper with the key-registrat...
Pooya Farshim, Bogdan Warinschi
AIME
2009
Springer
15 years 4 months ago
Data-Efficient Information-Theoretic Test Selection
We use the concept of conditional mutual information (MI) to approach problems involving the selection of variables in the area of medical diagnosis. Computing MI requires estimate...
Marianne Mueller, Rómer Rosales, Harald Ste...
101
Voted
ANCS
2007
ACM
15 years 4 months ago
A programmable message classification engine for session initiation protocol (SIP)
Session Initiation Protocol (SIP) has begun to be widely deployed for multiple services such as VoIP, Instant Messaging and Presence. Each of these services uses different SIP mes...
Arup Acharya, Xiping Wang, Charles Wright