Sciweavers

651 search results - page 93 / 131
» Decisions in thesaurus construction and use
Sort
View
SCN
2010
Springer
187views Communications» more  SCN 2010»
14 years 10 months ago
Searching Keywords with Wildcards on Encrypted Data
Abstract. A hidden vector encryption scheme (HVE) is a derivation of identity-based encryption, where the public key is actually a vector over a certain alphabet. The decryption ke...
Saeed Sedghi, Peter van Liesdonk, Svetla Nikova, P...
CHI
2005
ACM
16 years 6 days ago
The role of the author in topical blogs
Web logs, or blogs, challenge the notion of authorship. Seemingly, rather than a model in which the author's writings are themselves a contribution, the blog author weaves a ...
Scott Carter
ESORICS
2007
Springer
15 years 6 months ago
Modular Access Control Via Strategic Rewriting
Abstract. Security policies, in particular access control, are fundamental elements of computer security. We address the problem of authoring and analyzing policies in a modular wa...
Daniel J. Dougherty, Claude Kirchner, Hél&e...
ACL2
2006
ACM
15 years 5 months ago
A SAT-based procedure for verifying finite state machines in ACL2
We describe a new procedure for verifying ACL2 properties about finite state machines (FSMs) using satisfiability (SAT) solving. We present an algorithm for converting ACL2 conj...
Warren A. Hunt Jr., Erik Reeber
IEAAIE
2004
Springer
15 years 5 months ago
Recognition of Emotional States in Spoken Dialogue with a Robot
For flexible interactions between a robot and humans, we address the issue of automatic recognition of human emotions during the interaction such as embarrassment, pleasure, and af...
Kazunori Komatani, Ryosuke Ito, Tatsuya Kawahara, ...