Sciweavers

1188 search results - page 162 / 238
» States of Knowledge
Sort
View
ATAL
2009
Springer
15 years 5 months ago
Like an intuitive and courteous butler: a proactive personal agent for task management
The ability to proactively offer assistance promises to make personal agents more helpful to their users. We characterize the properties desired of proactive behaviour by a person...
Neil Yorke-Smith, Shahin Saadati, Karen L. Myers, ...
CRYPTO
2009
Springer
150views Cryptology» more  CRYPTO 2009»
15 years 5 months ago
Short and Stateless Signatures from the RSA Assumption
We present the first signature scheme which is “short”, stateless and secure under the RSA assumption in the standard model. Prior short, standard model signatures in the RSA...
Susan Hohenberger, Brent Waters
FQAS
2009
Springer
129views Database» more  FQAS 2009»
15 years 5 months ago
Representing Context Information for Document Retrieval
The bag of words representation (BoW), which is widely used in information retrieval (IR), represents documents and queries as word lists that do not express anything about context...
Maya Carrillo, Esaú Villatoro-Tello, Aureli...
IMA
2009
Springer
221views Cryptology» more  IMA 2009»
15 years 5 months ago
Cache Timing Analysis of LFSR-Based Stream Ciphers
Cache timing attacks are a class of side-channel attacks that is applicable against certain software implementations. They have generated significant interest when demonstrated ag...
Gregor Leander, Erik Zenner, Philip Hawkes
SEMWEB
2009
Springer
15 years 5 months ago
Coloring RDF Triples to Capture Provenance
Abstract. Recently, the W3C Linking Open Data effort has boosted the publication and inter-linkage of large amounts of RDF datasets on the Semantic Web. Various ontologies and know...
Giorgos Flouris, Irini Fundulaki, Panagiotis Pedia...