Sciweavers

515 search results - page 20 / 103
» Measuring Voter-Controlled Privacy
Sort
View
ISI
2008
Springer
15 years 1 months ago
Detecting Hidden Hierarchy in Terrorist Networks: Some Case Studies
This paper provides a novel algorithm to automatically detect the hidden hierarchy in terrorist networks. The algorithm is based on centrality measures used in social network analy...
Nasrullah Memon, Henrik Legind Larsen, David L. Hi...
CORR
2007
Springer
76views Education» more  CORR 2007»
15 years 1 months ago
Guessing based on length functions
— Close relationships between guessing functions and length functions are established. Good length functions lead to good guessing functions. In particular, guessing in the incre...
Rajesh Sundaresan
107
Voted
SP
2002
IEEE
134views Security Privacy» more  SP 2002»
15 years 1 months ago
Performance engineering, PSEs and the GRID
Performance Engineering is concerned with the reliable prediction and estimation of the performance of scientific and engineering applications on a variety of parallel and distrib...
Tony Hey, Juri Papay
128
Voted
SCN
2010
Springer
132views Communications» more  SCN 2010»
14 years 11 months ago
Solving Revocation with Efficient Update of Anonymous Credentials
Anonymous credential system promise efficient, ubiquitous access to digital services while preserving user privacy. However, their diffusion is impaired by the lack of efficient re...
Jan Camenisch, Markulf Kohlweiss, Claudio Soriente
98
Voted
MOC
2010
14 years 8 months ago
Computation of conformal representations of compact Riemann surfaces
We find a system of two polynomial equations in two unknowns, whose solution allows us to give an explicit expression of the conformal representation of a simply connected three-sh...
Guillermo López Lagomasino, Domingo Pestana...