Sciweavers

4445 search results - page 155 / 889
» Reflective Authorization Systems
Sort
View
ICICS
2010
Springer
15 years 2 months ago
Threshold Public-Key Encryption with Adaptive Security and Short Ciphertexts
Threshold public-key encryption (TPKE) allows a set of users to decrypt a ciphertext if a given threshold of authorized users cooperate. Existing TPKE schemes suffer from either lo...
Bo Qin, Qianhong Wu, Lei Zhang, Josep Domingo-Ferr...
180
Voted
WWW
2007
ACM
16 years 5 months ago
Measuring credibility of users in an e-learning environment
Learning Villages (LV) is an E-learning platform for people's online discussions and frequently citing postings of one another. In this paper, we propose a novel method to ra...
Wei Wei, Jimmy Ho-Man Lee, Irwin King
LREC
2008
150views Education» more  LREC 2008»
15 years 6 months ago
Automatic Document Quality Control
This paper focuses on automatically improving the readability of documents. We explore mechanisms relating to content control that could be used (i) by authors to improve the qual...
Neil Newbold, Lee Gillam
GEOINFORMATICA
2000
99views more  GEOINFORMATICA 2000»
15 years 4 months ago
GIS Software for Measuring Space-Time Accessibility in Transportation Planning and Analysis
: Transportation systems exist to improve individual accessibility. However, emerging applications of GIS in transportation (GIS-T) and intelligent transportation system (ITS) focu...
Harvey J. Miller, Yi-Hwa Wu
KDD
2004
ACM
210views Data Mining» more  KDD 2004»
16 years 5 months ago
Probabilistic author-topic models for information discovery
We propose a new unsupervised learning technique for extracting information from large text collections. We model documents as if they were generated by a two-stage stochastic pro...
Mark Steyvers, Padhraic Smyth, Michal Rosen-Zvi, T...