Sciweavers

3108 search results - page 183 / 622
» The Elements of Computer Credibility
Sort
View
INEX
2007
Springer
15 years 11 months ago
Phrase Detection in the Wikipedia
The Wikipedia XML collection turned out to be rich of marked-up phrases as we carried out our INEX 2007 experiments. Assuming that a phrase occurs at the inline level of the markup...
Miro Lehtonen, Antoine Doucet
POLICY
2007
Springer
15 years 11 months ago
Web Rule Languages to Carry Policies
Recent efforts in the area of Web policy languages show concerns on how to better represent both context and rules of a domain to deal with large number of resources and users. In...
Nima Kaviani, Dragan Gasevic, Marek Hatala, Gerd W...
PERCOM
2006
ACM
15 years 11 months ago
Groupanizer: a Method to Correlate Multi-users Position with Daily Moments
Groupanizer is an extension of groupware and constitutes a development platform to integrate user-centric information for the benefit of groupware applications. User-centric conte...
Jean Olivier Caron, Yoshihiro Kawahara, Hiroyuki M...
SACMAT
2005
ACM
15 years 10 months ago
Purpose based access control of complex data for privacy protection
As privacy becomes a major concern for both consumers and enterprises, many research efforts have been devoted to the development of privacy protecting technology. We recently pr...
Ji-Won Byun, Elisa Bertino, Ninghui Li
CRYPTO
2005
Springer
127views Cryptology» more  CRYPTO 2005»
15 years 10 months ago
Black-Box Secret Sharing from Primitive Sets in Algebraic Number Fields
A black-box secret sharing scheme (BBSSS) for a given access structure works in exactly the same way over any finite Abelian group, as it only requires black-box access to group o...
Ronald Cramer, Serge Fehr, Martijn Stam