Sciweavers

3257 search results - page 591 / 652
» networking 2004
Sort
View
CRYPTO
2006
Springer
159views Cryptology» more  CRYPTO 2006»
15 years 1 months ago
Asymptotically Optimal Two-Round Perfectly Secure Message Transmission
Abstract. The problem of perfectly secure message transmission concerns two synchronized non-faulty processors sender (S) and receiver (R) that are connected by a synchronous netwo...
Saurabh Agarwal, Ronald Cramer, Robbert de Haan
CEAS
2005
Springer
15 years 1 days ago
Computers beat Humans at Single Character Recognition in Reading based Human Interaction Proofs (HIPs)
Human interaction proofs (HIPs) have become commonplace on the internet for protecting free online services from abuse by automated scripts/bots. They are challenges designed to b...
Kumar Chellapilla, Kevin Larson, Patrice Y. Simard...
CHI
2005
ACM
15 years 1 days ago
Relescope: an experiment in accelerating relationships
Busy academics and professionals are being called upon to manage more and more relationships. Many details of collaboration are accessible in digital libraries and other repositor...
Stephen Farrell, Christopher S. Campbell, Suvda My...
ECIR
2010
Springer
14 years 11 months ago
Mining Neighbors' Topicality to Better Control Authority Flow
Web pages are often recognized by others through contexts. These contexts determine how linked pages influence and interact with each other. When differentiating such interactions,...
Na Dai, Brian D. Davison, Yaoshuang Wang
LREC
2008
111views Education» more  LREC 2008»
14 years 11 months ago
MEDAR: Collaboration between European and Mediterranean Arabic Partners to Support the Development of Language Technology for Ar
After the successful completion of the NEMLAR project 2003-2005, a new opportunity for a project was opened by the European Commission, and a group of largely the same partners is...
Bente Maegaard, Mohammed Atiyya, Khalid Choukri, S...