Sciweavers

1610 search results - page 183 / 322
» Identity Based Multisignatures
Sort
View
SETN
2004
Springer
15 years 6 months ago
Exploiting Cross-Document Relations for Multi-document Evolving Summarization
This paper presents a methodology for summarization from multiple documents which are about a specic topic. It is based on the specication and identication of the cross-document...
Stergos D. Afantenos, Irene Doura, Eleni Kapellou,...
81
Voted
DATE
2003
IEEE
84views Hardware» more  DATE 2003»
15 years 6 months ago
Dynamic Functional Unit Assignment for Low Power
A hardware method for functional unit assignment is presented, based on the principle that a functional unit’s power consumption is approximated by the switching activity of its...
Steve Haga, Natasha Reeves, Rajeev Barua, Diana Ma...
82
Voted
ICSM
2003
IEEE
15 years 6 months ago
Towards a Versioning Model for Component-based Software Assembly
The world of software development has rapidly changed in the last few years due to the adoption of component-based technologies. The classical software configuration management, ...
Jaroslav Gergic
101
Voted
WPES
2003
ACM
15 years 6 months ago
Hidden Credentials
Hidden Credentials are useful in situations where requests for service, credentials, access policies and resources are extremely sensitive. We show how transactions which depend o...
Jason E. Holt, Robert W. Bradshaw, Kent E. Seamons...
94
Voted
ATAL
2003
Springer
15 years 6 months ago
An incentive compatible reputation mechanism
Traditional centralised approaches to security are difficult to apply to large, distributed marketplaces in which software agents operate. Developing a notion of trust that is ba...
Radu Jurca, Boi Faltings