Sciweavers

5799 search results - page 351 / 1160
» Position Paper
Sort
View
IEEEARES
2009
IEEE
15 years 11 months ago
Identity-Based Hybrid Signcryption
—Signcryption is a cryptographic primitive that fulfills both the functions of digital signature and public key encryption simultaneously, at a cost significantly lower than th...
Fagen Li, Masaaki Shirase, Tsuyoshi Takagi
118
Voted
MKM
2009
Springer
15 years 11 months ago
A Review of Mathematical Knowledge Management
Mathematical Knowledge Management (MKM), as a field, has seen tremendous growth in the last few years. This period was one where many research threads were started and the field ...
Jacques Carette, William M. Farmer
ROBOCOMM
2007
IEEE
15 years 11 months ago
Achieving connectivity through coalescence in mobile robot networks
—Coalescence is the problem of isolated mobile robots independently searching for peers with the goal of forming a single connected network. This paper analyzes coalescence time ...
Sameera Poduri, Gaurav S. Sukhatme
VLDB
2005
ACM
114views Database» more  VLDB 2005»
15 years 10 months ago
Checking for k-Anonymity Violation by Views
When a private relational table is published using views, secrecy or privacy may be violated. This paper uses a formally-defined notion of k-anonymity to measure disclosure by vi...
Chao Yao, Xiaoyang Sean Wang, Sushil Jajodia
MEDINFO
2007
113views Healthcare» more  MEDINFO 2007»
15 years 6 months ago
Semantic Issues in Integrating Data from Different Models to Achieve Data Interoperability
Matching clinical data to codes in controlled terminologies is the first step towards achieving standardisation of data for safe and accurate data interoperability. The MoST autom...
Rahil Qamar, Alan Rector