Sciweavers

10459 search results - page 2016 / 2092
» Multimedia Information Retrieval
Sort
View
TCC
2007
Springer
125views Cryptology» more  TCC 2007»
15 years 4 months ago
Evaluating Branching Programs on Encrypted Data
Abstract. We present a public-key encryption scheme with the following properties. Given a branching program P and an encryption c of an input x, it is possible to efficiently com...
Yuval Ishai, Anat Paskin
INFOCOM
2006
IEEE
15 years 3 months ago
The Internet Dark Matter - on the Missing Links in the AS Connectivity Map
Abstract— The topological structure of the Internet infrastructure is an important and interesting subject that attracted significant research attention in the last few years. A...
Rami Cohen, Danny Raz
IRI
2006
IEEE
15 years 3 months ago
T2K2: A type II KASER
—The transformational methodology described in this paper induces new knowledge, which may be open under any deductive process. The method of transposition is used to maintain a ...
Stuart Harvey Rubin, Shu-Ching Chen, James B. Law
ACMDIS
2006
ACM
15 years 3 months ago
Design research for a context-aware capture system to support biology education
Automatic capture technology could enable students to record and index much information—both digital and nondigital—with little extra effort. Can this technology be designed t...
Abe Crystal
MSWIM
2006
ACM
15 years 3 months ago
Ticket-based mobile commerce system and its implementation
Security is a critical issue in mobile commerce, especially in mobile database systems since mobile environments are dynamic and traditional protection mechanisms do not work very...
Hua Wang, Xiaodi Huang, Goutham Reddy Dodda
« Prev « First page 2016 / 2092 Last » Next »