Sciweavers

2030 search results - page 304 / 406
» Extremal Problems of Information Combining
Sort
View
SEMWEB
2007
Springer
14 years 3 months ago
Semantic Enterprise Technologies
Abstract. Nowadays enterprises request information technologies that leverage structured and unstructured information for providing a single integrated view of business problems in...
Massimo Ruffolo, Luigi Guadagno, Inderbir Sidhu
TCC
2007
Springer
89views Cryptology» more  TCC 2007»
14 years 3 months ago
On Secret Sharing Schemes, Matroids and Polymatroids
Abstract. One of the main open problems in secret sharing is the characterization of the access structures of ideal secret sharing schemes. As a consequence of the results by Brick...
Jaume Martí-Farré, Carles Padr&oacut...
VLDB
2007
ACM
295views Database» more  VLDB 2007»
14 years 3 months ago
From Data Privacy to Location Privacy: Models and Algorithms
This tutorial presents the definition, the models and the techniques of location privacy from the data privacy perspective. By reviewing and revising the state of art research in ...
Ling Liu
CCS
2005
ACM
14 years 2 months ago
Automated trust negotiation using cryptographic credentials
In automated trust negotiation (ATN), two parties exchange digitally signed credentials that contain attribute information to establish trust and make access control decisions. Be...
Jiangtao Li, Ninghui Li, William H. Winsborough
SCHULE
2001
Springer
14 years 1 months ago
Co-operative ICT-supported learning. A practical approach to design
Abstract: Education is changing, following changes in society. The focus is shifting from teaching towards learning. And Informatics, more particularly Information and Communicatio...
Tom J. van Weert