Sciweavers

1411 search results - page 123 / 283
» Case Studies of an Insider Framework
Sort
View
ACNS
2007
Springer
105views Cryptology» more  ACNS 2007»
15 years 5 months ago
Analyzing an Electronic Cash Protocol Using Applied Pi Calculus
Abstract. Untraceability and unreuseability are essential security properties for electronic cash protocols. Many protocols have been proposed to meet these two properties. However...
Zhengqin Luo, Xiaojuan Cai, Jun Pang, Yuxin Deng
ECTEL
2007
Springer
15 years 5 months ago
FAsTA: A Folksonomy-Based Automatic Metadata Generator
Folksonomies provide a free source of keywords describing web resources, however, these keywords are free form and unstructured. In this paper, we describe a novel tool that conver...
Hend S. Al-Khalifa, Hugh C. Davis
ICALP
2007
Springer
15 years 5 months ago
Commitment Under Uncertainty: Two-Stage Stochastic Matching Problems
Abstract. We define and study two versions of the bipartite matching problem in the framework of two-stage stochastic optimization with recourse. In one version the uncertainty is...
Irit Katriel, Claire Kenyon-Mathieu, Eli Upfal
WEBI
2007
Springer
15 years 5 months ago
An Augmented Tagging Scheme with Triple Tagging and Collective Filtering
Collaborative tagging is increasingly drawing attentions. However the keyword based tagging scheme has its limitations and it can be observed that tagging society are seeking and ...
Jie Yang, Yutaka Matsuo, Mitsuru Ishizuka
ICRA
2006
IEEE
106views Robotics» more  ICRA 2006»
15 years 5 months ago
Decentralized Optimization of Distributed Supply-chain
— In this paper, the problem of optimizing the performances of a distributed supply chain is faced by means of a decentralized architecture. In particular, a general scheme for a...
Marco Ghirardi, Giuseppe Menga, Nicola Sacco