Sciweavers

6431 search results - page 1082 / 1287
» Model Building by Resolution
Sort
View
131
Voted
CRYPTO
2007
Springer
132views Cryptology» more  CRYPTO 2007»
15 years 9 months ago
Secure Hybrid Encryption from Weakened Key Encapsulation
We put forward a new paradigm for building hybrid encryption schemes from constrained chosen-ciphertext secure (CCCA) key-encapsulation mechanisms (KEMs) plus authenticated symmet...
Dennis Hofheinz, Eike Kiltz
DAWAK
2007
Springer
15 years 9 months ago
Automating the Schema Matching Process for Heterogeneous Data Warehouses
Abstract. A federated data warehouse is a logical integration of data warehouses applicable when physical integration is impossible due to privacy policy or legal restrictions. In ...
Marko Banek, Boris Vrdoljak, A. Min Tjoa, Zoran Sk...
99
Voted
ECAL
2007
Springer
15 years 9 months ago
Controlling an Anthropomimetic Robot: A Preliminary Investigation
The human body has a complex skeleton, giving a very high number of degrees of freedom, and is actuated by a large number of elastic elements muscles and tendons. As a consequence,...
Hugo Gravato Marques, Richard Newcombe, Owen Holla...
146
Voted
ECAL
2007
Springer
15 years 9 months ago
Spatial Embedding and Complexity: The Small-World Is Not Enough
The “order for free” exhibited by some classes of system has been exploited by natural selection in order to build systems capable of exhibiting complex behaviour. Here we expl...
Christopher L. Buckley, Seth Bullock
135
Voted
EUROCRYPT
2007
Springer
15 years 9 months ago
Simulatable Adaptive Oblivious Transfer
We study an adaptive variant of oblivious transfer in which a sender has N messages, of which a receiver can adaptively choose to receive k one-after-the-other, in such a way that ...
Jan Camenisch, Gregory Neven, Abhi Shelat
« Prev « First page 1082 / 1287 Last » Next »