Sciweavers

3229 search results - page 217 / 646
» Mixing
Sort
View
126
Voted
FC
2010
Springer
145views Cryptology» more  FC 2010»
15 years 2 months ago
Cryptographic Protocol Analysis of AN.ON
This work presents a cryptographic analysis of AN.ON’s anonymization protocols. We have discovered three flaws of differing severity. The first is caused by the fact that the ...
Benedikt Westermann, Rolf Wendolsky, Lexi Pimenidi...
114
Voted
PSD
2010
Springer
154views Database» more  PSD 2010»
15 years 1 months ago
Coprivacy: Towards a Theory of Sustainable Privacy
We introduce the novel concept of coprivacy or co-operative privacy to make privacy preservation attractive. A protocol is coprivate if the best option for a player to preserve her...
Josep Domingo-Ferrer
4OR
2010
148views more  4OR 2010»
15 years 1 months ago
Point-to-point shortest paths on dynamic time-dependent road networks
This a summary of the author's PhD thesis supervised by Leo Liberti, Philippe Baptiste and Daniel Krob and defended on 18 June 2009 at Ecole Polytechnique, Palaiseau, France. ...
Giacomo Nannicini
SEMWEB
2010
Springer
15 years 1 months ago
Linked Data Query Processing Strategies
Abstract. Recently, processing of queries on linked data has gained attention. We identify and systematically discuss three main strategies: a bottom-up strategy that discovers new...
Günter Ladwig, Thanh Tran
ACL
2009
15 years 1 months ago
Opinion and Generic Question Answering Systems: a Performance Analysis
The importance of the new textual genres such as blogs or forum entries is growing in parallel with the evolution of the Social Web. This paper presents two corpora of blog posts ...
Alexandra Balahur, Ester Boldrini, Andrés M...