Sciweavers

3505 search results - page 565 / 701
» Information Theory and the IrisCode
Sort
View
GROUP
2007
ACM
15 years 1 months ago
That's what friends are for: facilitating 'who knows what' across group boundaries
We describe the design and evaluation of K-net, a social matching system to help people learn 'who knows what' in an organization by matching people with skills with tho...
N. Sadat Shami, Y. Connie Yuan, Dan Cosley, Ling X...
ACMICEC
2006
ACM
117views ECommerce» more  ACMICEC 2006»
15 years 1 months ago
Practical secrecy-preserving, verifiably correct and trustworthy auctions
We present a practical protocol based on homomorphic cryptography for conducting provably fair sealed-bid auctions. The system preserves the secrecy of the bids, even after the an...
David C. Parkes, Michael O. Rabin, Stuart M. Shieb...
APSEC
2004
IEEE
15 years 1 months ago
Reasoning about Semantic Web in Isabelle/HOL
Semantic Web is regarded as the next generation of the World Wide Web. It provides not only the structure of the web but also meaningful semantics for the information presented. T...
Yue Tang, Jin Song Dong, Jing Sun, Brendan P. Maho...
ATAL
2006
Springer
15 years 1 months ago
ANEMONE: an effective minimal ontology negotiation environment
Communication in open heterogeneous multi agent systems is hampered by lack of shared ontologies. To overcome these problems, we propose a layered communication protocol which inc...
Jurriaan van Diggelen, Robbert-Jan Beun, Frank Dig...
CCS
2006
ACM
15 years 1 months ago
On the modeling and analysis of obligations
Traditional security policies largely focus on access control requirements, which specify who can access what under what circumstances. Besides access control requirements, the av...
Keith Irwin, Ting Yu, William H. Winsborough