Sciweavers

2601 search results - page 84 / 521
» Secure Rewarding Schemes
Sort
View
122
Voted
PST
2004
15 years 4 months ago
Efficient Revocation of Dynamic Security Privileges in Hierarchically Structured Communities
This paper presents the first mediated hierarchical identity-based encryption and signature schemes. Both schemes are designed to support information access control in hierarchical...
Deholo Nali, Ali Miri, Carlisle M. Adams
132
Voted
ECRTS
2003
IEEE
15 years 8 months ago
Multi-Version Scheduling in Rechargeable Energy-Aware Real-Time Systems
In the context of battery-powered real-time systems three constraints need to be addressed: energy, deadlines and task rewards. Many future real-time systems will count on differe...
Cosmin Rusu, Rami G. Melhem, Daniel Mossé
CSCW
2012
ACM
13 years 10 months ago
Removing gamification from an enterprise SNS
Gamification, the use of game mechanics in non-gaming applications, has been applied to various systems to encourage desired user behaviors. In this paper, we examine patterns of ...
Jennifer Thom-Santelli, David R. Millen, Joan Morr...
ACL
2011
14 years 6 months ago
A Class of Submodular Functions for Document Summarization
We design a class of submodular functions meant for document summarization tasks. These functions each combine two terms, one which encourages the summary to be representative of ...
Hui Lin, Jeff Bilmes
ACISP
2006
Springer
15 years 6 months ago
Efficient Identity-Based Signatures Secure in the Standard Model
The only known construction of identity-based signatures that can be proven secure in the standard model is based on the approach of attaching certificates to non-identity-based si...
Kenneth G. Paterson, Jacob C. N. Schuldt