Sciweavers

23557 search results - page 4233 / 4712
» Distributed Computing - Introduction
Sort
View
AFRICACRYPT
2010
Springer
15 years 8 months ago
Efficient Unidirectional Proxy Re-Encryption
Abstract. Proxy re-encryption (PRE) allows a semi-trusted proxy to convert a ciphertext originally intended for Alice into one encrypting the same plaintext for Bob. The proxy only...
Sherman S. M. Chow, Jian Weng, Yanjiang Yang, Robe...
CAV
2010
Springer
190views Hardware» more  CAV 2010»
15 years 8 months ago
Measuring and Synthesizing Systems in Probabilistic Environments
Often one has a preference order among the different systems that satisfy a given specification. Under a probabilistic assumption about the possible inputs, such a preference order...
Krishnendu Chatterjee, Thomas A. Henzinger, Barbar...
200
Voted
EATIS
2009
ACM
15 years 8 months ago
Agent based smart house platform with affective control
In this paper, we describe our work in developing an agent based smart house platform using TAOM4E development methodology and the JADE-platform with the Jadex-extension. In order...
Kuderna-Iulian Benta, Amalia Hoszu, Lucia Vacariu,...
ESORICS
2009
Springer
15 years 8 months ago
Medical Image Integrity Control Combining Digital Signature and Lossless Watermarking
Enforcing protection of medical content becomes a major issue of computer security. Since medical contents are more and more widely distributed, it is necessary to develop security...
Wei Pan, Gouenou Coatrieux, Nora Cuppens-Boulahia,...
AAAI
2007
15 years 7 months ago
Probabilistic Community Discovery Using Hierarchical Latent Gaussian Mixture Model
Complex networks exist in a wide array of diverse domains, ranging from biology, sociology, and computer science. These real-world networks, while disparate in nature, often compr...
Haizheng Zhang, C. Lee Giles, Henry C. Foley, John...
« Prev « First page 4233 / 4712 Last » Next »