Sciweavers

1169 search results - page 190 / 234
» Two Ways to Common Knowledge
Sort
View
COOPIS
2004
IEEE
15 years 1 months ago
A Framework for Prototyping J2EE Replication Algorithms
In application server systems, such as J2EE, replication is an essential strategy for reliability and efficiency. Many J2EE implementations, both commercial and open-source, provid...
Özalp Babaoglu, Alberto Bartoli, Vance Maveri...
ACNS
2010
Springer
187views Cryptology» more  ACNS 2010»
15 years 1 months ago
Generic Constructions for Verifiably Encrypted Signatures without Random Oracles or NIZKs
Verifiably encrypted signature schemes (VES) allow a signer to encrypt his or her signature under the public key of a trusted third party, while maintaining public signature verifi...
Markus Rückert, Michael Schneider 0002, Domin...
IIR
2010
14 years 11 months ago
An IR-Based Approach for Tag Recommendation
Thanks to the continuous growth of collaborative platforms like YouTube, Flickr and Delicious, we are recently witnessing to a rapid evolution of web dynamics towards a more `soci...
Cataldo Musto, Fedelucio Narducci, Marco de Gemmis...
VCIP
2003
147views Communications» more  VCIP 2003»
14 years 11 months ago
An objective method for combining multiple subjective data sets
International recommendations for subjective video quality assessment (e.g., ITU-R BT.500-11) include specifications for how to perform many different types of subjective tests. I...
Margaret H. Pinson, Stephen Wolf
ECIR
1998
Springer
14 years 11 months ago
Evaluation of Interfaces for IRS: Modelling End-User Searching Behaviour
This paper describes an investigation in progress into the searching behaviour of end-users and how it is affected by interface design. The project focused on qualitative data gat...
Victoria Manglano, Micheline Beaulieu, Stephen E. ...