Sciweavers

11345 search results - page 2075 / 2269
» Foundations of Computer Science
Sort
View
PAIRING
2010
Springer
116views Cryptology» more  PAIRING 2010»
15 years 1 months ago
Fully Secure Anonymous HIBE and Secret-Key Anonymous IBE with Short Ciphertexts
Lewko and Waters [Eurocrypt 2010] presented a fully secure HIBE with short ciphertexts. In this paper we show how to modify their construction to achieve anonymity. We prove the s...
Angelo De Caro, Vincenzo Iovino, Giuseppe Persiano
PERSUASIVE
2010
Springer
15 years 1 months ago
Animate Objects: How Physical Motion Encourages Public Interaction
The primary challenge for information terminals, kiosks, and incidental use systems of all sorts, is that of getting the “first click” from busy passersby. This paper presents ...
Wendy Ju, David Sirkin
SPIRE
2010
Springer
15 years 1 months ago
Restricted LCS
The Longest Common Subsequence (LCS) of two or more strings is a fundamental well-studied problem which has a wide range of applications throughout computational sciences. When the...
Zvi Gotthilf, Danny Hermelin, Gad M. Landau, Moshe...
TON
2010
141views more  TON 2010»
15 years 1 months ago
Weighted spectral distribution for internet topology analysis: theory and applications
Abstract—Comparing graphs to determine the level of underlying structural similarity between them is a widely encountered problem in computer science. It is particularly relevant...
Damien Fay, Hamed Haddadi, Andrew Thomason, Andrew...
ECWEB
2010
Springer
179views ECommerce» more  ECWEB 2010»
15 years 1 months ago
Concession Behaviour in Automated Negotiation
Traditional negotiation, conducted face-to-face and via mail or telephone, is often difficult to manage, prone to misunderstanding, and time consuming. Automated negotiation promis...
Fernando Lopes, Helder Coelho
« Prev « First page 2075 / 2269 Last » Next »