Sciweavers

3702 search results - page 696 / 741
» All Pairings Are in a Group
Sort
View
EUROCRYPT
2010
Springer
15 years 5 months ago
Public-Key Encryption in the Bounded-Retrieval Model
We construct the first public-key encryption scheme in the Bounded-Retrieval Model (BRM), providing security against various forms of adversarial “key leakage” attacks. In th...
Joël Alwen, Yevgeniy Dodis, Moni Naor, Gil Se...
104
Voted
ERCIMDL
2009
Springer
177views Education» more  ERCIMDL 2009»
15 years 5 months ago
Curated Databases
Curated databases are databases that are populated and updated with a great deal of human effort. Most reference works that one traditionally found on the reference shelves of li...
Peter Buneman
GIS
2009
ACM
15 years 5 months ago
Conceptualization of place via spatial clustering and co-occurrence analysis
More and more users are contributing and sharing more and more contents on the Web via the use of content hosting sites and social media services. These user–generated contents ...
Dong-Po Deng, Tyng-Ruey Chuang, Rob Lemmens
216
Voted
AGENTS
2001
Springer
15 years 5 months ago
Adjustable autonomy in real-world multi-agent environments
Through adjustable autonomy (AA), an agent can dynamically vary the degree to which it acts autonomously, allowing it to exploit human abilities to improve its performance, but wi...
Paul Scerri, David V. Pynadath, Milind Tambe
SSDBM
2000
IEEE
149views Database» more  SSDBM 2000»
15 years 5 months ago
Coordinating Simultaneous Caching of File Bundles from Tertiary Storage
In a previous paper [Shoshani et al 99], we described a system called STACS (Storage Access Coordination System) for High Energy and Physics (HEP) experiments. These experiments g...
Arie Shoshani, Alex Sim, Luis M. Bernardo, Henrik ...