Sciweavers

10304 search results - page 1819 / 2061
» Computer science with the sciences: an emphasis in computati...
Sort
View
OTM
2010
Springer
15 years 11 days ago
A Context-Based Model for the Interpretation of Polysemous Terms
The problem of polysemy involves having terms, such as “truck”, that refer to multiple concepts in different contexts; and conversely, having the same concept referred to with...
Chrisa Tsinaraki, Yannis Velegrakis, Nadzeya Kiyav...
PAIRING
2010
Springer
116views Cryptology» more  PAIRING 2010»
15 years 11 days ago
Fully Secure Anonymous HIBE and Secret-Key Anonymous IBE with Short Ciphertexts
Lewko and Waters [Eurocrypt 2010] presented a fully secure HIBE with short ciphertexts. In this paper we show how to modify their construction to achieve anonymity. We prove the s...
Angelo De Caro, Vincenzo Iovino, Giuseppe Persiano
PERSUASIVE
2010
Springer
15 years 11 days ago
Animate Objects: How Physical Motion Encourages Public Interaction
The primary challenge for information terminals, kiosks, and incidental use systems of all sorts, is that of getting the “first click” from busy passersby. This paper presents ...
Wendy Ju, David Sirkin
TON
2010
141views more  TON 2010»
15 years 9 days ago
Weighted spectral distribution for internet topology analysis: theory and applications
Abstract—Comparing graphs to determine the level of underlying structural similarity between them is a widely encountered problem in computer science. It is particularly relevant...
Damien Fay, Hamed Haddadi, Andrew Thomason, Andrew...
ICASSP
2010
IEEE
14 years 12 months ago
Towards objectifying information hiding
In this paper, the concept of object-oriented embedding (OOE) is introduced into information hiding in general and particularly to steganography which is the science that involves...
Abbas Cheddad, Joan Condell, Kevin Curran, Paul Mc...
« Prev « First page 1819 / 2061 Last » Next »