Sciweavers

5333 search results - page 1011 / 1067
» Business
Sort
View
ACNS
2010
Springer
187views Cryptology» more  ACNS 2010»
15 years 1 months ago
Generic Constructions for Verifiably Encrypted Signatures without Random Oracles or NIZKs
Verifiably encrypted signature schemes (VES) allow a signer to encrypt his or her signature under the public key of a trusted third party, while maintaining public signature verifi...
Markus Rückert, Michael Schneider 0002, Domin...
DASFAA
2009
IEEE
193views Database» more  DASFAA 2009»
15 years 1 months ago
Encryption over Semi-trusted Database
—Database security has become a vital issue in modern Web applications. Critical business data in databases is an evident target for attack. Therefore, ensuring the confidentiali...
Hasan Kadhem, Toshiyuki Amagasa, Hiroyuki Kitagawa
AAAI
2008
15 years 2 days ago
Semantical Considerations on Dialectical and Practical Commitments
This paper studies commitments in multiagent systems. A dialectical commitment corresponds to an agent taking a position about a putative fact, including for the sake of argument....
Munindar P. Singh
AIPS
2008
15 years 2 days ago
Linear Relaxation Techniques for Task Management in Uncertain Settings
In this paper, we consider the problem of assisting a busy user in managing her workload of pending tasks. We assume that our user is typically oversubscribed, and is invariably j...
Pradeep Varakantham, Stephen F. Smith
WSC
2007
15 years 2 days ago
Towards a conceptual framework for visual analytics of time and time-oriented data
Time is an important data dimension with distinct characteristics that is common across many application domains. This demands specialized methods in order to support proper analy...
Wolfgang Aigner, Alessio Bertone, Silvia Miksch, C...
« Prev « First page 1011 / 1067 Last » Next »