Sciweavers

4325 search results - page 691 / 865
» Incremental computation with names
Sort
View
ATAL
2005
Springer
15 years 5 months ago
How Bee-Like Agents Support Cultural Heritage
Abstract. Elderly people are a great repository of knowledge, the majority of which has never been gathered by formal means. In this paper we introduce an application of multi-agen...
Martí Fàbregas, Beatriz López...
CRYPTO
2005
Springer
127views Cryptology» more  CRYPTO 2005»
15 years 5 months ago
Black-Box Secret Sharing from Primitive Sets in Algebraic Number Fields
A black-box secret sharing scheme (BBSSS) for a given access structure works in exactly the same way over any finite Abelian group, as it only requires black-box access to group o...
Ronald Cramer, Serge Fehr, Martijn Stam
91
Voted
CTRSA
2005
Springer
79views Cryptology» more  CTRSA 2005»
15 years 5 months ago
Malicious Cryptography: Kleptographic Aspects
Abstract. In the last few years we have concentrated our research efforts on new threats to the computing infrastructure that are the result of combining malicious software (malwar...
Adam Young, Moti Yung
DCOSS
2005
Springer
15 years 5 months ago
Design and Comparison of Lightweight Group Management Strategies in EnviroSuite
Tracking is one of the major applications of wireless sensor networks. EnviroSuite, as a programming paradigm, provides a comprehensive solution for programming tracking applicatio...
Liqian Luo, Tarek F. Abdelzaher, Tian He, John A. ...
EUROCAST
2005
Springer
133views Hardware» more  EUROCAST 2005»
15 years 5 months ago
An Iterative Method for Mining Frequent Temporal Patterns
The incorporation of temporal semantic into the traditional data mining techniques has caused the creation of a new area called Temporal Data Mining. This incorporation is especial...
Francisco Guil, Antonio B. Bailón, Alfonso ...