Sciweavers

1497 search results - page 297 / 300
» A Computational Model for Message Passing
Sort
View
HRI
2012
ACM
12 years 3 months ago
Designing persuasive robots: how robots might persuade people using vocal and nonverbal cues
Social robots have to potential to serve as personal, organizational, and public assistants as, for instance, diet coaches, teacher’s aides, and emergency respondents. The succe...
Vijay Chidambaram, Yueh-Hsuan Chiang, Bilge Mutlu
WWW
2009
ACM
14 years 8 months ago
Social search in "Small-World" experiments
The "algorithmic small-world hypothesis" states that not only are pairs of individuals in a large social network connected by short paths, but that ordinary individuals ...
Sharad Goel, Roby Muhamad, Duncan J. Watts
WWW
2008
ACM
14 years 8 months ago
Detecting image spam using visual features and near duplicate detection
Email spam is a much studied topic, but even though current email spam detecting software has been gaining a competitive edge against text based email spam, new advances in spam g...
Bhaskar Mehta, Saurabh Nangia, Manish Gupta 0002, ...
EUROCRYPT
2009
Springer
14 years 8 months ago
Asymmetric Group Key Agreement
A group key agreement (GKA) protocol allows a set of users to establish a common secret via open networks. Observing that a major goal of GKAs for most applications is to establish...
Qianhong Wu, Yi Mu, Willy Susilo, Bo Qin, Josep Do...
PKC
2009
Springer
166views Cryptology» more  PKC 2009»
14 years 8 months ago
Security of Blind Signatures under Aborts
We explore the security of blind signatures under aborts where the user or the signer may stop the interactive signature issue protocol prematurely. Several works on blind signatur...
Dominique Schröder, Marc Fischlin