Sciweavers

6574 search results - page 1167 / 1315
» Current Signatures: Application
Sort
View
SODA
2012
ACM
203views Algorithms» more  SODA 2012»
11 years 10 months ago
Black-box reductions for cost-sharing mechanism design
We consider the design of strategyproof cost-sharing mechanisms. We give two simple, but extremely versatile, black-box reductions, that in combination reduce the cost-sharing mec...
Konstantinos Georgiou, Chaitanya Swamy
EUROCRYPT
2012
Springer
11 years 10 months ago
Property Preserving Symmetric Encryption
Abstract. Processing on encrypted data is a subject of rich investigation. Several new and exotic encryption schemes, supporting a diverse set of features, have been developed for ...
Omkant Pandey, Yannis Rouselakis
SDM
2012
SIAM
234views Data Mining» more  SDM 2012»
11 years 10 months ago
Monitoring and Mining Insect Sounds in Visual Space
Monitoring animals by the sounds they produce is an important and challenging task, whether the application is outdoors in a natural habitat, or in the controlled environment of a...
Yuan Hao, Bilson J. L. Campana, Eamonn J. Keogh
ESORICS
2012
Springer
11 years 10 months ago
Secure Proximity Detection for NFC Devices Based on Ambient Sensor Data
In certain applications, it is important for a remote server to securely determine whether or not two mobile devices are in close physical proximity. In particular, in the context ...
Tzipora Halevi, Di Ma, Nitesh Saxena, Tuo Xiang
CORR
2010
Springer
232views Education» more  CORR 2010»
13 years 8 months ago
MiBoard: Multiplayer Interactive Board Game
Serious games have recently emerged as an avenue for curriculum delivery. Serious games incorporate motivation and entertainment while providing pointed curriculum for the user. Th...
Kyle B. Dempsey, Justin F. Brunelle, G. Tanner Jac...
« Prev « First page 1167 / 1315 Last » Next »