Sciweavers

5414 search results - page 924 / 1083
» Exploratory Model Building
Sort
View
CRYPTO
2008
Springer
150views Cryptology» more  CRYPTO 2008»
15 years 5 months ago
On Notions of Security for Deterministic Encryption, and Efficient Constructions without Random Oracles
Abstract. The study of deterministic public-key encryption was initiated by Bellare et al. (CRYPTO '07), who provided the "strongest possible" notion of security for...
Alexandra Boldyreva, Serge Fehr, Adam O'Neill
130
Voted
DIMEA
2008
164views Multimedia» more  DIMEA 2008»
15 years 5 months ago
Lessons learned: game design for large public displays
This paper presents the design and deployment of Polar Defence, an interactive game for a large public display. We designed this display based on a model of "users" and ...
Matthias Finke, Anthony Tang, Rock Leung, Michael ...
ESWS
2008
Springer
15 years 5 months ago
Combining SAWSDL, OWL-DL and UDDI for Semantically Enhanced Web Service Discovery
UDDI registries are included as a standard offering within the product suite of any major SOA vendor, serving as the foundation for establishing design-time and run-time SOA govern...
Dimitrios Kourtesis, Iraklis Paraskakis
ESWS
2008
Springer
15 years 5 months ago
Adding Data Mining Support to SPARQL Via Statistical Relational Learning Methods
Exploiting the complex structure of relational data enables to build better models by taking into account the additional information provided by the links between objects. We exten...
Christoph Kiefer, Abraham Bernstein, André ...
EUC
2008
Springer
15 years 5 months ago
Privacy Engine for Context-Aware Enterprise Application Services
Satisfying the varied privacy preferences of individuals, while exposing context data to authorized applications and individuals, remains a major challenge for context-aware compu...
Marion Blount, John Davis, Maria Ebling, William F...