Sciweavers

3190 search results - page 150 / 638
» cans 2011
Sort
View
KCAP
2011
ACM
14 years 8 months ago
Eliciting hierarchical structures from enumerative structures for ontology learning
Some discourse structures such as enumerative structures have typographical, punctuational and laying out characteristics which (1) make them easily identifiable and (2) convey hi...
Mouna Kamel, Bernard Rothenburger
IACR
2011
89views more  IACR 2011»
14 years 5 months ago
Identity-Based Decryption
Identity-based decryption is an alternative to identity-based encryption, in which Alice encrypts a symmetric key for Bob under a trusted authority’s public key. Alice sends Bob...
Daniel R. L. Brown
IACR
2011
128views more  IACR 2011»
14 years 5 months ago
Sign Modules in Secure Arithmetic Circuits
In this paper, we study the complexity of secure multiparty computation using only the secure arithmetic black-box of a finite field, counting the cost by the number of secure m...
Ching-Hua Yu
CSMR
2011
IEEE
14 years 9 months ago
RTFM (Read the Factual Mails) - Augmenting Program Comprehension with Remail
—The advent of globalization has led to the adoption of distributed software development as a common practice. One of its drawbacks -the absence of impromptu meetingsis tackled w...
Alberto Bacchelli, Michele Lanza, Vitezslav Humpa
VR
2011
IEEE
376views Virtual Reality» more  VR 2011»
14 years 9 months ago
Self-motion illusions in immersive virtual reality environments
Motion perception in immersive virtual reality environments significantly differs from the real world. For example, previous work has shown that users tend to underestimate trave...
Gerd Bruder, Frank Steinicke, Phil Wieland