Sciweavers

679 search results - page 106 / 136
» Using decision problems in public key cryptography
Sort
View
ASIACRYPT
2009
Springer
15 years 8 months ago
Group Encryption: Non-interactive Realization in the Standard Model
Group encryption (GE) schemes, introduced at Asiacrypt’07, are an encryption analogue of group signatures with a number of interesting applications. They allow a sender to encryp...
Julien Cathalo, Benoît Libert, Moti Yung
JOT
2008
142views more  JOT 2008»
15 years 1 months ago
Mining Edgar Tender Offers
This paper describes how use the HTMLEditorKit to perform web data mining on EDGAR (Electronic Data-Gathering, Analysis, and Retrieval system). EDGAR is the SEC's (U.S. Secur...
Douglas Lyon
CONTEXT
2007
Springer
15 years 5 months ago
A Personalized Retrieval Model based on Influence Diagrams
Abstract. A key challenge in information retrieval is the use of contextual evidence within ad-hoc retrieval. Our contribution is particularly based on the belief that contextual r...
Nesrine Zemirli, Lynda Tamine, Mohand Boughanem
CIAC
2003
Springer
98views Algorithms» more  CIAC 2003»
15 years 6 months ago
Improving Customer Proximity to Railway Stations
Abstract. We consider problems of (new) station placement along (existing) railway tracks, so as to increase the number of users. We prove that, in spite of the NP-hardness for the...
Evangelos Kranakis, Paolo Penna, Konrad Schlude, D...
TON
2010
158views more  TON 2010»
14 years 11 months ago
Always acyclic distributed path computation
Abstract—Distributed routing algorithms may give rise to transient loops during path recomputation, which can pose significant stability problems in high-speed networks. We pres...
Saikat Ray, Roch Guérin, Kin Wah Kwong, Rut...