Sciweavers

8972 search results - page 45 / 1795
» Private Information Retrieval
Sort
View
ISW
2004
Springer
15 years 5 months ago
A Hierarchical Key-Insulated Signature Scheme in the CA Trust Model
In key-insulated cryptography, there are many private keys with different indexes and a single, fixed public key. When the trust model includes multiple Certification Authoritie...
Zhengyi Le, Yi Ouyang, James Ford, Fillia Makedon
129
Voted
ICMCS
2009
IEEE
153views Multimedia» more  ICMCS 2009»
14 years 10 months ago
Audio-visual privacy protection for video conference
Group video-conferencing systems are routinely used in major corporations, hospitals and universities for meetings, tele-medicine and distance learning among participants from very...
M. Vijay Venkatesh, Jian Zhao, L. Profitt, Sen-Chi...
81
Voted
SAGT
2009
Springer
108views Game Theory» more  SAGT 2009»
15 years 7 months ago
On the Planner's Loss Due to Lack of Information in Bayesian Mechanism Design
In this paper we study a large class of resource allocation problems with an important complication, the utilization cost of a given resource is private information of a profit ma...
José R. Correa, Nicolas Figueroa
CSWWS
2006
15 years 4 months ago
A Trust Model for Sharing Ratings of Information Providers on the Semantic Web
In the context of the Semantic Web, it may be beneficial for a user (consumer) to receive ratings from other users (advisors) regarding the reliability of an information source (pr...
Jie Zhang, Robin Cohen
98
Voted
AAAI
1994
15 years 1 months ago
Using Induction to Refine Information Retrieval Strategies
Conceptual information retrieval systems use structured document indices, domain knowledge and a set of heuristic retrieval strategies to match user queries with a set of indices ...
Catherine Baudin, Barney Pell, Smadar Kedar