Sciweavers

18493 search results - page 3370 / 3699
» Timers for Distributed Systems
Sort
View
CANS
2008
Springer
86views Cryptology» more  CANS 2008»
15 years 7 months ago
Chosen-Ciphertext Secure Proxy Re-encryption without Pairings
Proxy re-encryption (PRE), introduced by Blaze, Bleumer and Strauss, allows a semi-trusted proxy to convert a ciphertext originally intended for Alice into an encryption of the sa...
Robert H. Deng, Jian Weng, Shengli Liu, Kefei Chen
150
Voted
CIKM
2008
Springer
15 years 7 months ago
Workload-based optimization of integration processes
The efficient execution of integration processes between distributed, heterogeneous data sources and applications is a challenging research area of data management. These inn proc...
Matthias Böhm, Uwe Wloka, Dirk Habich, Wolfga...
136
Voted
CIKM
2008
Springer
15 years 7 months ago
Ranked feature fusion models for ad hoc retrieval
We introduce the Ranked Feature Fusion framework for information retrieval system design. Typical information retrieval formalisms such as the vector space model, the bestmatch mo...
Jeremy Pickens, Gene Golovchinsky
ATAL
2006
Springer
15 years 7 months ago
Evaluating bidding strategies for simultaneous auctions
Bidding for multiple items or bundles on online auctions raises challenging problems. We assume that an agent has a valuation function that returns its valuation for an arbitrary ...
Teddy Candale, Sandip Sen
ATAL
2006
Springer
15 years 7 months ago
Selecting informative actions improves cooperative multiagent learning
In concurrent cooperative multiagent learning, each agent simultaneously learns to improve the overall performance of the team, with no direct control over the actions chosen by i...
Liviu Panait, Sean Luke
« Prev « First page 3370 / 3699 Last » Next »