Sciweavers

1051 search results - page 157 / 211
» Adaptive User Modelling in AthosMail
Sort
View
SASO
2007
IEEE
15 years 11 months ago
Leveraging Resource Prediction for Anticipatory Dynamic Configuration
Self-adapting systems based on multiple concurrent applications must decide how to allocate scarce resources to applications and how to set the quality parameters of each applicat...
Vahe Poladian, David Garlan, Mary Shaw, M. Satyana...
ICAT
2006
IEEE
15 years 11 months ago
Enhancing Immersiveness in AR-Based Product Design
Recently, various AR-based product design methodologies have been introduced. In this paper, we propose technologies for enhancing the immersive realization of virtual objects, whe...
Taejin Ha, Yeongmi Kim, Jeha Ryu, Woontack Woo
SP
2010
IEEE
206views Security Privacy» more  SP 2010»
15 years 8 months ago
Revocation Systems with Very Small Private Keys
In this work, we design a method for creating public key broadcast encryption systems. Our main technical innovation is based on a new “two equation” technique for revoking us...
Allison B. Lewko, Amit Sahai, Brent Waters
UMUAI
1998
119views more  UMUAI 1998»
15 years 4 months ago
COLLAGEN: A Collaboration Manager for Software Interface Agents
We have implemented an application-independent collaboration manager, called Collagen, based on the SharedPlan theory of discourse, and used it to build a software interface agent...
Charles Rich, Candace L. Sidner
157
Voted
PKC
2009
Springer
210views Cryptology» more  PKC 2009»
16 years 5 months ago
Controlling Access to an Oblivious Database Using Stateful Anonymous Credentials
In this work, we consider the task of allowing a content provider to enforce complex access control policies on oblivious protocols conducted with anonymous users. As our primary ...
Scott E. Coull, Matthew Green, Susan Hohenberger