Sciweavers

229 search results - page 19 / 46
» Agreements Without Disagreements
Sort
View
SDM
2009
SIAM
105views Data Mining» more  SDM 2009»
14 years 6 months ago
Exploiting Semantic Constraints for Estimating Supersenses with CRFs.
The annotation of words and phrases by ontology concepts is extremely helpful for semantic interpretation. However many ontologies, e.g. WordNet, are too fine-grained and even hu...
Gerhard Paaß, Frank Reichartz
ER
2007
Springer
99views Database» more  ER 2007»
14 years 3 months ago
Capturing Users' Everyday, Implicit Information Integration Decisions
Integration of large databases by expert teams is only a small part of the data integration activities that take place. Users without data integration expertise very often gather,...
David W. Archer, Lois M. L. Delcambre
EUROCRYPT
2004
Springer
14 years 3 months ago
On Generating the Initial Key in the Bounded-Storage Model
Abstract. In the bounded-storage model (BSM) for information-theoretically secure encryption and key-agreement one uses a random string R whose length t is greater than the assumed...
Stefan Dziembowski, Ueli M. Maurer
IWSOS
2007
Springer
14 years 3 months ago
Automated Trust Negotiation in Autonomic Environments
Autonomic computing environments rely on devices that are able to make intelligent decisions without human supervision. Automated Trust Negotiation supports the cooperation of devi...
Andreas Klenk, Frank Petri, Benoit Radier, Mika&eu...
ADHOC
2007
91views more  ADHOC 2007»
13 years 9 months ago
Non-interactive key establishment in mobile ad hoc networks
We present a new non-interactive key agreement and progression (NIKAP) scheme for mobile ad hoc networks (MANETs), which does not require an on-line centralized authority, can non...
Zhenjiang Li, J. J. Garcia-Luna-Aceves