Sciweavers

1054 search results - page 203 / 211
» group 2005
Sort
View
CCS
2008
ACM
14 years 11 months ago
Multi-use unidirectional proxy re-signatures
In 1998, Blaze, Bleumer, and Strauss suggested a cryptographic primitive termed proxy re-signature in which a proxy transforms a signature computed under Alice's secret key in...
Benoît Libert, Damien Vergnaud
DIM
2005
ACM
14 years 11 months ago
Establishing and protecting digital identity in federation systems
We develop solutions for the security and privacy of user identity information in a federation. By federation we mean a group of organizations or service providers which have buil...
Abhilasha Bhargav-Spantzel, Anna Cinzia Squicciari...
AAAI
2010
14 years 11 months ago
Efficient Lifting for Online Probabilistic Inference
Lifting can greatly reduce the cost of inference on firstorder probabilistic graphical models, but constructing the lifted network can itself be quite costly. In online applicatio...
Aniruddh Nath, Pedro Domingos
NIPS
2008
14 years 11 months ago
Psychiatry: Insights into depression through normative decision-making models
Decision making lies at the very heart of many psychiatric diseases. It is also a central theoretical concern in a wide variety of fields and has undergone detailed, in-depth, ana...
Quentin J. M. Huys, Joshua T. Vogelstein, Peter Da...
SOCRATES
2008
133views Education» more  SOCRATES 2008»
14 years 11 months ago
From Daily Language to Scientific Jargon: The Role of Peer Interaction in Web Forum
The paper presents the activities and the results of the "Child Observation in school context workshop", an on line course realized during the last academic years at Mac...
P. Nicolini, T. Lapucci