Sciweavers

1610 search results - page 191 / 322
» Identity Based Multisignatures
Sort
View
UAI
2003
15 years 2 months ago
The Information Bottleneck EM Algorithm
Learning with hidden variables is a central challenge in probabilistic graphical models that has important implications for many real-life problems. The classical approach is usin...
Gal Elidan, Nir Friedman
SEC
2000
15 years 2 months ago
A Context-Sensitive Access Control Model and Prototype Implementation
: Role-based access control associates roles with privileges and users with roles. Changes to these associations are infrequent and explicit. This may not reflect business requirem...
Damian G. Cholewka, Reinhardt A. Botha, Jan H. P. ...
AAAI
1994
15 years 2 months ago
Formalizing Ontological Commitment
Formalizing the ontological commitment of a logical language means offering a way to specify the intended meaning of its vocabulary by constraining the set of its models, giving e...
Nicola Guarino, Massimiliano Carrara, Pierdaniele ...
TREC
2007
15 years 1 months ago
University of Glasgow at TREC 2007: Experiments in Blog and Enterprise Tracks with Terrier
In TREC 2007, we participate in four tasks of the Blog and Enterprise tracks. We continue experiments using Terrier1 [14], our modular and scalable Information Retrieval (IR) plat...
David Hannah, Craig Macdonald, Jie Peng, Ben He, I...
CHES
2010
Springer
132views Cryptology» more  CHES 2010»
15 years 1 months ago
Efficient Techniques for High-Speed Elliptic Curve Cryptography
In this paper, a thorough bottom-up optimization process (field, point and scalar arithmetic) is used to speed up the computation of elliptic curve point multiplication and report ...
Patrick Longa, Catherine H. Gebotys