Sciweavers

73 search results - page 3 / 15
» Die Another Day
Sort
View
PKC
2004
Springer
112views Cryptology» more  PKC 2004»
14 years 1 months ago
Identity-Based Threshold Decryption
Abstract. In this paper, we examine issues related to the construction of identity-based threshold decryption schemes and argue that it is important in practice to design an identi...
Joonsang Baek, Yuliang Zheng
KDD
1998
ACM
141views Data Mining» more  KDD 1998»
13 years 12 months ago
Rule Discovery from Time Series
We consider the problem of nding rules relating patterns in a time series to other patterns in that series, or patterns in one series to patterns in another series. A simple examp...
Gautam Das, King-Ip Lin, Heikki Mannila, Gopal Ren...
CHI
2004
ACM
14 years 8 months ago
Use of mobile appointment scheduling devices
One hundred thirty-eight subjects participated in a study on mobile appointment scheduling. Subjects completed a questionnaire on their primary method of managing appointments whe...
Thad Starner, Cornelis M. Snoeck, Benjamin A. Wong...
ATAL
2005
Springer
14 years 1 months ago
Implicit: an agent-based recommendation system for web search
The number of web pages available on Internet increases day after day, and consequently finding relevant information becomes more and more a hard task. However, when we consider ...
Aliaksandr Birukou, Enrico Blanzieri, Paolo Giorgi...
MOBIMEDIA
2007
13 years 9 months ago
AAA and mobile networks: security aspects and architectural efficiency
Security is a crucial factor in the provision of the network services, in both wireless and wired communications. Day by day, the number of subscribers is increased by an exponent...
Nicolas Sklavos, Spyros G. Denazis, Odysseas G. Ko...