Sciweavers

6300 search results - page 1136 / 1260
» We have it easy, but do we have it right
Sort
View
CCS
2007
ACM
15 years 7 months ago
A simple and expressive semantic framework for policy composition in access control
In defining large, complex access control policies, one would like to compose sub-policies, perhaps authored by different organizations, into a single global policy. Existing po...
Glenn Bruns, Daniel S. Dantas, Michael Huth
FC
2007
Springer
158views Cryptology» more  FC 2007»
15 years 7 months ago
Hidden Identity-Based Signatures
This paper introduces Hidden Identity-based Signatures (Hidden-IBS), a type of digital signatures that provide mediated signer-anonymity on top of Shamir’s Identity-based signat...
Aggelos Kiayias, Hong-Sheng Zhou
RWEB
2007
Springer
15 years 7 months ago
Semantic Descriptions in an Enterprise Search Solution
Today customers want to use powerful search engines for their huge and increasing content repositories. Full-text-only products with simple result lists are not enough to satisfy t...
Uwe Crenze, Stefan Köhler, Kristian Hermsdorf...
IROS
2006
IEEE
107views Robotics» more  IROS 2006»
15 years 7 months ago
Learning Sensory-Motor Maps for Redundant Robots
— Humanoid robots are routinely engaged in tasks requiring the coordination between multiple degrees of freedom and sensory inputs, often achieved through the use of sensorymotor...
Manuel Lopes, José Santos-Victor
P2P
2006
IEEE
211views Communications» more  P2P 2006»
15 years 7 months ago
Comparison of Image Similarity Queries in P2P Systems
Given some of the recent advances in Distributed Hash Table (DHT) based Peer-To-Peer (P2P) systems we ask the following questions: Are there applications where unstructured querie...
Wolfgang Müller 0002, P. Oscar Boykin, Nima S...
« Prev « First page 1136 / 1260 Last » Next »