Sciweavers

151 search results - page 4 / 31
» his 2009
Sort
View
QI
2009
Springer
123views Physics» more  QI 2009»
14 years 9 days ago
Hilbert Space Models Commodity Exchanges
Abstract. It is argued that the vector space measures used to measure closeness of market prices to predictors for market prices are invalid because of the observed metric of commo...
Paul Cockshott
RP
2009
Springer
103views Control Systems» more  RP 2009»
14 years 9 days ago
On Yen's Path Logic for Petri Nets
In [13], Yen defines a class of formulas for paths in Petri nets and claims that its satisfiability problem is EXPSPACE-complete. In this paper, we show that in fact the satisfi...
Mohamed Faouzi Atig, Peter Habermehl
CISC
2009
Springer
154views Cryptology» more  CISC 2009»
13 years 3 months ago
Efficient Generalized Selective Private Function Evaluation with Applications in Biometric Authentication
In a selective private function evaluation (SPFE) protocol, the client privately computes some predefined function on his own input and on m out of server's n database element...
Helger Lipmaa, Bingsheng Zhang
FQAS
2009
Springer
186views Database» more  FQAS 2009»
13 years 3 months ago
Dynamically Personalizing Search Results for Mobile Users
Abstract. We introduce a novel situation-aware approach to personalize search results for mobile users. By providing a mobile user with appropriate information that dynamically sat...
Ourdia Bouidghaghen, Lynda Tamine-Lechani, Mohand ...
CSIE
2009
IEEE
13 years 9 months ago
Accessing Password-Protected Resources without the Password
Sometimes it is desirable to access password-protected resources, but undesirable to disclose the password to the machine in use. In such situations, providing the password is a t...
Andreas Pashalidis