Sciweavers

433 search results - page 23 / 87
» Administrative and Public Verifiability: Can We Have Both
Sort
View
EGOV
2010
Springer
13 years 8 months ago
Designing Quality Business Processes for E-Government Digital Services
Abstract. Research works and surveys focusing on e-Government Digital Services availability and usage, reveal that often services are available but ignored by citizens. In our hypo...
Flavio Corradini, Damiano Falcioni, Andrea Polini,...
HPDC
2006
IEEE
14 years 1 months ago
Autonomic Adaptation of Virtual Distributed Environments in a Multi-Domain Infrastructure
By federating resources from multiple domains, a shared infrastructure provides aggregated computation resources to a large number of users. With rapid advances in virtualization ...
Dongyan Xu, Paul Ruth, Junghwan Rhee, Rick Kennell...
ASIACRYPT
2001
Springer
14 years 1 days ago
How to Leak a Secret
In this paper we formalize the notion of a ring signature, which makes it possible to specify a set of possible signers without revealing which member actually produced the signatu...
Ronald L. Rivest, Adi Shamir, Yael Tauman
POPL
1997
ACM
13 years 11 months ago
Parameterized Types for Java
Java offers the real possibility that most programs can be written in a type-safe language. However, for Java to be broadly useful, it needs additional expressive power. This pape...
Andrew C. Myers, Joseph A. Bank, Barbara Liskov
CE
2008
160views more  CE 2008»
13 years 7 months ago
Data mining in course management systems: Moodle case study and tutorial
Educational data mining is an emerging discipline, concerned with developing methods for exploring the unique types of data that come from the educational context. This work is a ...
Cristóbal Romero, Sebastián Ventura,...