Sciweavers

6906 search results - page 85 / 1382
» An algorithm for modelling key terms
Sort
View
ACNS
2009
Springer
158views Cryptology» more  ACNS 2009»
15 years 10 months ago
A New Variant of the Cramer-Shoup KEM Secure against Chosen Ciphertext Attack
We propose a new variant of the Cramer-Shoup KEM (key encapsulation mechanism). The proposed variant is more efficient than the original Cramer-Shoup KEM scheme in terms of public...
Joonsang Baek, Willy Susilo, Joseph K. Liu, Jianyi...
ICN
2009
Springer
15 years 8 months ago
New Algorithm for the Design of Topology Aware Hypercube in Multi-hop Ad Hoc Networks
Securing group communications in resource constrained, infrastructure-less environments such as Mobile Ad Hoc Networks (MANETs) has become one of the most challenging research dire...
Maria Striki, Kyriakos Manousakis, John S. Baras
IFIP
2009
Springer
15 years 8 months ago
Reference Model for Performance Management in Service-Oriented Virtual Organization Breeding Environments
Performance management (PM) is a key function of virtual organization (VO) management. A large set of PM indicators has been proposed and evaluated within the context of virtual br...
Zbigniew Paszkiewicz, Willy Picard
WWW
2009
ACM
16 years 4 months ago
Automatically assessing resource quality for educational digital libraries
With the rise of community-generated web content, the need for automatic assessment of resource quality has grown, particularly in the realm of educational digital libraries. We d...
Philipp G. Wetzler, Steven Bethard, Kirsten R. But...
100
Voted
WWW
2008
ACM
16 years 4 months ago
Model bloggers' interests based on forgetting mechanism
Blogs have been expanded at an incredible speed in recent years. Plentiful personal information makes blogs a popular way mining user profiles. In this paper, we propose a novel b...
Yuan Cheng, Guang Qiu, Jiajun Bu, Kangmiao Liu, Ye...