Sciweavers

10396 search results - page 1857 / 2080
» Deployment Support Network
Sort
View
135
Voted
CCS
2009
ACM
16 years 4 months ago
An ID-based authenticated key exchange protocol based on bilinear Diffie-Hellman problem
In this paper, we present a new ID-based two-party authenticated key exchange (AKE) protocol, which makes use of a new technique called twin Diffie-Hellman problem proposed by Cas...
Hai Huang, Zhenfu Cao
126
Voted
KDD
2002
ACM
157views Data Mining» more  KDD 2002»
16 years 4 months ago
Exploiting unlabeled data in ensemble methods
An adaptive semi-supervised ensemble method, ASSEMBLE, is proposed that constructs classification ensembles based on both labeled and unlabeled data. ASSEMBLE alternates between a...
Kristin P. Bennett, Ayhan Demiriz, Richard Maclin
131
Voted
CHI
2005
ACM
16 years 4 months ago
Six themes of the communicative appropriation of photographic images
In this paper, we explore the use of digital photographs in computer-mediated communication. We present Lascaux, an instant messaging client that serves as a research platform for...
Amy Voida, Elizabeth D. Mynatt
CHI
2005
ACM
16 years 4 months ago
Meeteetse: social well-being through place attachment
This paper introduces Meeteetse, a set of technologies designed to facilitate social well-being through place attachment. Meeteetse builds a connection between individual homes an...
Kynthia Brunette, Matthew Eisenstadt, Erik Pukinsk...
POPL
2005
ACM
16 years 4 months ago
Formal prototyping in early stages of protocol design
Network protocol design is usually an informal process where debugging is based on successive iterations of a prototype implementation. The feedback provided by a prototype can be...
Alwyn Goodloe, Carl A. Gunter, Mark-Oliver Stehr
« Prev « First page 1857 / 2080 Last » Next »