Sciweavers

1169 search results - page 190 / 234
» Two Ways to Common Knowledge
Sort
View
COOPIS
2004
IEEE
15 years 3 months ago
A Framework for Prototyping J2EE Replication Algorithms
In application server systems, such as J2EE, replication is an essential strategy for reliability and efficiency. Many J2EE implementations, both commercial and open-source, provid...
Özalp Babaoglu, Alberto Bartoli, Vance Maveri...
ACNS
2010
Springer
187views Cryptology» more  ACNS 2010»
15 years 3 months ago
Generic Constructions for Verifiably Encrypted Signatures without Random Oracles or NIZKs
Verifiably encrypted signature schemes (VES) allow a signer to encrypt his or her signature under the public key of a trusted third party, while maintaining public signature verifi...
Markus Rückert, Michael Schneider 0002, Domin...
IIR
2010
15 years 1 months ago
An IR-Based Approach for Tag Recommendation
Thanks to the continuous growth of collaborative platforms like YouTube, Flickr and Delicious, we are recently witnessing to a rapid evolution of web dynamics towards a more `soci...
Cataldo Musto, Fedelucio Narducci, Marco de Gemmis...
VCIP
2003
147views Communications» more  VCIP 2003»
15 years 1 months ago
An objective method for combining multiple subjective data sets
International recommendations for subjective video quality assessment (e.g., ITU-R BT.500-11) include specifications for how to perform many different types of subjective tests. I...
Margaret H. Pinson, Stephen Wolf
ECIR
1998
Springer
15 years 1 months ago
Evaluation of Interfaces for IRS: Modelling End-User Searching Behaviour
This paper describes an investigation in progress into the searching behaviour of end-users and how it is affected by interface design. The project focused on qualitative data gat...
Victoria Manglano, Micheline Beaulieu, Stephen E. ...