Sciweavers

9095 search results - page 1683 / 1819
» Service RT Systems
Sort
View
IJISEC
2007
87views more  IJISEC 2007»
15 years 4 months ago
Breaking four mix-related schemes based on Universal Re-encryption
Universal Re-encryption allows El-Gamal ciphertexts to be re-encrypted without knowledge of their corresponding public keys. This has made it an enticing building block for anonymo...
George Danezis
IJNSEC
2007
111views more  IJNSEC 2007»
15 years 4 months ago
A Novel Peer-to-peer Payment Protocol
In this paper a novel electronic payment protocol suitable for “peer-to-peer” (P2P) networks is presented. It implements electronic cash-based transactions, between buyers and...
Despoina Palaka, Petros Daras, Kosmas Petridis, Mi...
IPM
2007
139views more  IPM 2007»
15 years 4 months ago
A semantic Bayesian network approach to retrieving information with intelligent conversational agents
As access to information becomes more intensive in society, a great deal of that information is becoming available through diverse channels. Accordingly, users require effective ...
Kyoung Min Kim, Jin-Hyuk Hong, Sung-Bae Cho
TLT
2008
93views more  TLT 2008»
15 years 4 months ago
What Do You Prefer? Using Preferences to Enhance Learning Technology
While the growing number of learning resources increases the choice for learners on how, what and when to learn, it also makes it more and more difficult to find the learning resou...
Philipp Kärger, Daniel Olmedilla, Fabian Abel...
TPDS
2008
75views more  TPDS 2008»
15 years 4 months ago
Performance-Guided Load (Un)balancing under Autocorrelated Flows
Size-based policies have been shown in the literature to effectively balance load and improve performance in cluster environments. Size-based policies assign jobs to servers based...
Qi Zhang, Ningfang Mi, Alma Riska, Evgenia Smirni
« Prev « First page 1683 / 1819 Last » Next »