Sciweavers

267 search results - page 40 / 54
» Online Auctions: There Can Be Only One
Sort
View
IJNSEC
2006
110views more  IJNSEC 2006»
14 years 11 months ago
Password-based Encrypted Group Key Agreement
This paper presents an efficient password-based authenticated encrypted group key agreement protocol immune to dictionary attack under the computation Diffie-Hellman (CDH) assumpt...
Ratna Dutta, Rana Barua
JIFS
2007
102views more  JIFS 2007»
14 years 11 months ago
Knowledge propagation in a distributed omnidirectional vision system
In this paper an omnidirectional Distributed Vision System (DVS) is presented. The presented DVS is able to learn to navigate a mobile robot in its working environment without any...
Emanuele Menegatti, C. Simionato, Stefano Tonello,...
114
Voted
SIGOPS
1998
123views more  SIGOPS 1998»
14 years 11 months ago
A New Family of Authentication Protocols
Abstract. We present a related family of authentication and digital signature protocols based on symmetric cryptographic primitives which perform substantially better than previous...
Ross J. Anderson, Francesco Bergadano, Bruno Crisp...
100
Voted
PVLDB
2008
137views more  PVLDB 2008»
14 years 11 months ago
Flashing up the storage layer
In the near future, commodity hardware is expected to incorporate both flash and magnetic disks. In this paper we study how the storage layer of a database system can benefit from...
Ioannis Koltsidas, Stratis Viglas
118
Voted
ICDM
2010
IEEE
228views Data Mining» more  ICDM 2010»
14 years 9 months ago
Active Learning from Multiple Noisy Labelers with Varied Costs
In active learning, where a learning algorithm has to purchase the labels of its training examples, it is often assumed that there is only one labeler available to label examples, ...
Yaling Zheng, Stephen D. Scott, Kun Deng