Sciweavers

2607 search results - page 394 / 522
» Complete Functional Synthesis
Sort
View
128
Voted
ISW
2009
Springer
15 years 9 months ago
Privacy-Aware Attribute-Based Encryption with User Accountability
As a new public key primitive, attribute-based encryption (ABE) is envisioned to be a promising tool for implementing fine-grained access control. To further address the concern o...
Jin Li, Kui Ren, Bo Zhu, Zhiguo Wan
SEMWEB
2009
Springer
15 years 9 months ago
Exploiting User Feedback to Improve Semantic Web Service Discovery
State-of-the-art discovery of Semantic Web services is based on hybrid algorithms that combine semantic and syntactic matchmaking. These approaches are purely based on similarity m...
Anna Averbakh, Daniel Krause, Dimitrios Skoutas
SIGECOM
2009
ACM
95views ECommerce» more  SIGECOM 2009»
15 years 9 months ago
Eliciting truthful answers to multiple-choice questions
Motivated by the prevalence of online questionnaires in electronic commerce, and of multiple-choice questions in such questionnaires, we consider the problem of eliciting truthful...
Nicolas S. Lambert, Yoav Shoham
146
Voted
CDC
2008
IEEE
171views Control Systems» more  CDC 2008»
15 years 9 months ago
Constrained optimal control theory for differential linear repetitive processes
Abstract. Differential repetitive processes are a distinct class of continuous-discrete twodimensional linear systems of both systems theoretic and applications interest. These pr...
Michael Dymkov, Eric Rogers, Siarhei Dymkou, Krzys...
99
Voted
CDC
2008
IEEE
123views Control Systems» more  CDC 2008»
15 years 9 months ago
On distributed averaging algorithms and quantization effects
—We consider distributed iterative algorithms for the averaging problem over time-varying topologies. Our focus is on the convergence time of such algorithms when complete (unqua...
Angelia Nedic, Alexander Olshevsky, Asuman E. Ozda...