We demonstrate how the framework that is used for creating efficient number-theoretic ID and signature schemes can be transferred into the setting of lattices. This results in cons...
This paper puts forward new efficient constructions for public-key broadcast encryption that simultaneously enjoy the following properties: receivers are stateless; encryption is c...
This paper presents an approach to designing interactive systems that enables critical performance parameters to be identified and models of performance to be constructed. The met...
William M. Newman, Alex S. Taylor, Christopher R. ...
Abstract. Assertion-based contracts provide a powerful mechanism for stating invariants at module boundaries and for enforcing them uniformly. In 2002, Findler and Felleisen showed...
In this paper we describe our TRECVID 2008 video retrieval experiments. The MediaMill team participated in three tasks: concept detection, automatic search, and interactive search...
Cees G. M. Snoek, Koen E. A. van de Sande, Ork de ...