Sciweavers

3629 search results - page 644 / 726
» A More Efficient Use of Delta-CRLs
Sort
View
ICISC
2008
89views Cryptology» more  ICISC 2008»
14 years 11 months ago
Survival in the Wild: Robust Group Key Agreement in Wide-Area Networks
Group key agreement (GKA) allows a set of players to establish a shared secret and thus bootstrap secure group communication. GKA is very useful in many types of peer group scenar...
Jihye Kim, Gene Tsudik
ISTA
2007
14 years 11 months ago
Towards Information Management System for Licensing in Higher Education: An Ontology-Based Approach
Higher education licensing, i.e. the process of granting permissions to provide certain educational services, is an important process of public administration. Governmental bodies ...
Olga Cherednichenko, Dmytro Kuklenko, Sergiy Zlatk...
SEC
2008
14 years 11 months ago
Role Signatures for Access Control in Open Distributed Systems
Implementing access control efficiently and effectively in an open and distributed system is a challenging problem. One reason for this is that users requesting access to remote re...
Jason Crampton, Hoon Wei Lim
UAI
2008
14 years 11 months ago
Learning Arithmetic Circuits
Graphical models are usually learned without regard to the cost of doing inference with them. As a result, even if a good model is learned, it may perform poorly at prediction, be...
Daniel Lowd, Pedro Domingos
UAI
2008
14 years 11 months ago
Toward Experiential Utility Elicitation for Interface Customization
User preferences for automated assistance often vary widely, depending on the situation, and quality or presentation of help. Developing effective models to learn individual prefe...
Bowen Hui, Craig Boutilier