Sciweavers

3782 search results - page 539 / 757
» Engineering Social Order
Sort
View
TCC
2010
Springer
381views Cryptology» more  TCC 2010»
16 years 1 months ago
New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts
We construct a fully secure HIBE scheme with short ciphertexts. The previous construction of Boneh, Boyen, and Goh was only proven to be secure in the selective model, under a non...
Allison B. Lewko, Brent Waters
153
Voted
CSE
2009
IEEE
15 years 11 months ago
A Design Methodology for Self-Management in Distributed Environments
—Autonomic computing is a paradigm that aims at reducing administrative overhead by providing autonomic managers to make applications self-managing. In order to better deal with ...
Ahmad Al-Shishtawy, Vladimir Vlassov, Per Brand, S...
CSE
2009
IEEE
15 years 11 months ago
Intelligent Middleware for Adaptive Sensing of Tennis Coaching Sessions
—In professional tennis training matches, the coach needs to be able to view play from the most appropriate angle in order to monitor players activities. In this paper, we presen...
Richard Tynan, Anthony Schoofs, Conor Muldoon, Gre...
IRI
2009
IEEE
15 years 11 months ago
OntoMatch: A Monotonically Improving Schema Matching System for Autonomous Data Integration
Traditional schema matchers use a set of distinct simple matchers and use a composition function to combine the individual scores using an arbitrary order of matcher application l...
Anupam Bhattacharjee, Hasan M. Jamil
FSTTCS
2009
Springer
15 years 11 months ago
Non-Local Box Complexity and Secure Function Evaluation
ABSTRACT. A non-local box is an abstract device into which Alice and Bob input bits x and y respectively and receive outputs a and b respectively, where a, b are uniformly distribu...
Marc Kaplan, Iordanis Kerenidis, Sophie Laplante, ...