Sciweavers

1282 search results - page 202 / 257
» Signing on signing off
Sort
View
108
Voted
FOCS
1992
IEEE
15 years 4 months ago
Maximizing Non-Linear Concave Functions in Fixed Dimension
Consider a convex set P in IRd and a piecewise polynomial concave function F: P IR. Let A be an algorithm that given a point x IRd computes F(x) if x P, or returns a concave po...
Sivan Toledo
88
Voted
ACMSE
2007
ACM
15 years 4 months ago
Semi-transparent video interfaces to assist deaf persons in meetings
Meetings are a vital part of participation in social activities. For a deaf person who does not understand spoken language, following a discourse at meetings can become confusing ...
Dorian Miller, Karl Gyllstrom, P. David Stotts, Ja...
CIKM
2007
Springer
15 years 4 months ago
Hypothesis testing with incomplete relevance judgments
Information retrieval experimentation generally proceeds in a cycle of development, evaluation, and hypothesis testing. Ideally, the evaluation and testing phases should be short ...
Ben Carterette, Mark D. Smucker
103
Voted
PKC
2010
Springer
183views Cryptology» more  PKC 2010»
15 years 4 months ago
Unlinkability of Sanitizable Signatures
Sanitizable signatures allow a designated party, called the sanitizer, to modify parts of signed data such that the immutable parts can still be verified with respect to the origi...
Christina Brzuska, Marc Fischlin, Anja Lehmann, Do...
110
Voted
EUROPKI
2007
Springer
15 years 4 months ago
OpenHSM: An Open Key Life Cycle Protocol for Public Key Infrastructure's Hardware Security Modules
Abstract. The private keys used in a PKI are its most important asset. Protect these keys from unauthorised use or disclosure is essential to secure a PKI. Relying parties need ass...
Jean Everson Martina, Túlio Cicero Salvaro ...