Sciweavers

1667 search results - page 305 / 334
» Extended clause learning
Sort
View
179
Voted
PKC
2012
Springer
279views Cryptology» more  PKC 2012»
13 years 6 months ago
Circular and KDM Security for Identity-Based Encryption
We initiate the study of security for key-dependent messages (KDM), sometimes also known as “circular” or “clique” security, in the setting of identity-based encryption (I...
Jacob Alperin-Sheriff, Chris Peikert
275
Voted
ICDE
2008
IEEE
190views Database» more  ICDE 2008»
16 years 5 months ago
Adaptive Segmentation for Scientific Databases
In this paper we explore database segmentation in the context of a column-store DBMS targeted at a scientific database. We present a novel hardware- and scheme-oblivious segmentati...
Milena Ivanova, Martin L. Kersten, Niels Nes
129
Voted
CSCW
2010
ACM
16 years 24 days ago
Are you having difficulty?
It would be useful if software engineers/instructors could be aware that remote team members/students are having difficulty with their programming tasks. We have developed an appr...
Jason Carter, Prasun Dewan
141
Voted
TEI
2010
ACM
170views Hardware» more  TEI 2010»
15 years 10 months ago
Swing that thing: moving to move
Swing That Thing… is a practice-based doctoral research project that examines how technology in on and around the body might be used to poeticise experience. Outcomes include a ...
Danielle Wilde
192
Voted
ICC
2007
IEEE
193views Communications» more  ICC 2007»
15 years 10 months ago
A Semantic Context Model for Location-Based Cooperative Mobile Computing
—This paper addresses context issues in pervasive mobile computing and presents a semantic context model to support location based cooperative mobile applications. In this paper,...
Bin Hu, Philip Moore, Hsiai-Hwa Chen