Sciweavers

2421 search results - page 183 / 485
» Message from the Editor-in-Chief
Sort
View
CSFW
2002
IEEE
15 years 6 months ago
Types and Effects for Asymmetric Cryptographic Protocols
We present the first type and effect system for proving authenticity properties of security protocols based on asymmetric cryptography. The most significant new features of our ...
Andrew D. Gordon, Alan Jeffrey
CSCW
1998
ACM
15 years 6 months ago
The Dynamics of Mass Interaction
Usenet may be regarded as the world’s largest conversational application, with over 17,000 newsgroups and 3 million users. Despite its ubiquity and popularity, however, we know ...
Steve Whittaker, Loren G. Terveen, William C. Hill...
PRESENCE
2002
124views more  PRESENCE 2002»
15 years 1 months ago
Near-Field Virtual Audio Displays
In tasks that require listeners to monitor two or more simultaneous talkers, substantial performance benefits can be achieved by spatially separating the competing speech messages...
Douglas Brungart
110
Voted
IACR
2011
134views more  IACR 2011»
14 years 1 months ago
Concise Vector Commitments and their Applications to Zero-Knowledge Elementary Databases
Zero knowledge sets (ZKS) [18] allow a party to commit to a secret set S and then to, non interactively, produce proofs for statements such as x ∈ S or x /∈ S. As recognized in...
Dario Catalano, Dario Fiore
ICPR
2008
IEEE
16 years 3 months ago
Supervised learning of a generative model for edge-weighted graphs
This paper addresses the problem of learning archetypal structural models from examples. To this end we define a generative model for graphs where the distribution of observed nod...
Andrea Torsello, David L. Dowe