Sciweavers

8972 search results - page 45 / 1795
» Private Information Retrieval
Sort
View
ISW
2004
Springer
15 years 4 months ago
A Hierarchical Key-Insulated Signature Scheme in the CA Trust Model
In key-insulated cryptography, there are many private keys with different indexes and a single, fixed public key. When the trust model includes multiple Certification Authoritie...
Zhengyi Le, Yi Ouyang, James Ford, Fillia Makedon
ICMCS
2009
IEEE
153views Multimedia» more  ICMCS 2009»
14 years 8 months ago
Audio-visual privacy protection for video conference
Group video-conferencing systems are routinely used in major corporations, hospitals and universities for meetings, tele-medicine and distance learning among participants from very...
M. Vijay Venkatesh, Jian Zhao, L. Profitt, Sen-Chi...
SAGT
2009
Springer
108views Game Theory» more  SAGT 2009»
15 years 5 months ago
On the Planner's Loss Due to Lack of Information in Bayesian Mechanism Design
In this paper we study a large class of resource allocation problems with an important complication, the utilization cost of a given resource is private information of a profit ma...
José R. Correa, Nicolas Figueroa
CSWWS
2006
15 years 2 months ago
A Trust Model for Sharing Ratings of Information Providers on the Semantic Web
In the context of the Semantic Web, it may be beneficial for a user (consumer) to receive ratings from other users (advisors) regarding the reliability of an information source (pr...
Jie Zhang, Robin Cohen
AAAI
1994
15 years 8 days ago
Using Induction to Refine Information Retrieval Strategies
Conceptual information retrieval systems use structured document indices, domain knowledge and a set of heuristic retrieval strategies to match user queries with a set of indices ...
Catherine Baudin, Barney Pell, Smadar Kedar