Sciweavers

8825 search results - page 51 / 1765
» All for one or one for all
Sort
View
120
Voted
EUROCRYPT
2010
Springer
15 years 4 months ago
Efficient Lattice (H)IBE in the Standard Model
We construct an efficient identity based encryption system based on the standard learning with errors (LWE) problem. Our security proof holds in the standard model. The key step in...
Shweta Agrawal, Dan Boneh, Xavier Boyen
98
Voted
IAT
2005
IEEE
15 years 6 months ago
Using Similarity Measures for an Efficient Business Information-Exchange
Several problems are involved in the Virtual Enterprise (VE) formation process. One of the most important problems is the lack of understanding that may arise during agents’ int...
Andreia Malucelli, Eugénio C. Oliveira
101
Voted
ICIP
2002
IEEE
16 years 2 months ago
Semantic image segmentation using morphological tools
In this work, we study the extraction of semantic objects using morphological tools. We decompose the image into its level sets and level lines (the borders of the level sets). Sp...
Alvaro Pardo
97
Voted
COCOC
1995
150views Combinatorics» more  COCOC 1995»
15 years 4 months ago
On Central Spanning Trees of a Graph
We consider the collection of all spanning trees of a graph with distance between them based on the size of the symmetric difference of their edge sets. A central spanning tree o...
Sergei L. Bezrukov, Firoz Kaderali, W. Poguntke
127
Voted
IADIS
2004
15 years 2 months ago
The case for a holistic consideration of internet control
With the Internet rapidly becoming a ubiquitous and global tool inveigling all spheres of our lives so with the joys and pleasure comes the pain. There are many reasons why govern...
Alan Tracey, Helen Richardson