Sciweavers

974 search results - page 166 / 195
» Formal Modeling of Communication Traces
Sort
View
CISC
2008
Springer
148views Cryptology» more  CISC 2008»
13 years 9 months ago
Publicly Verifiable Privacy-Preserving Group Decryption
Anonymity is one of the main concerns in group-oriented cryptography. However, most efforts, for instance, group signatures and ring signatures, are only made to provide anonymity ...
Bo Qin, Qianhong Wu, Willy Susilo, Yi Mu
MA
2010
Springer
104views Communications» more  MA 2010»
13 years 5 months ago
Representations of SO(3) and angular polyspectra
We characterize the angular polyspectra, of arbitrary order, associated with isotropic fields defined on the sphere S2 = (x, y, z) : x2 + y2 + z2 = 1 . Our techniques rely heavi...
D. Marinucci, G. Peccati
IJACTAICIT
2010
122views more  IJACTAICIT 2010»
13 years 4 months ago
Intelligent Integrated Management for Telecommunication Networks
As the size of communication networks keeps on growing, faster connections, cooperating technologies and the divergence of equipment and data communications, the management of the...
Antonio Martín, Carlos León, F&eacut...
TCIAIG
2010
13 years 2 months ago
Cinematic Visual Discourse: Representation, Generation, and Evaluation
In this paper, we present the design, implementation, and evaluation of an end-to-end camera planning system called Darshak. Darshak automatically constructs cinematic narrative di...
Arnav Jhala, R. Michael Young
WWW
2004
ACM
14 years 8 months ago
Semantic email
This paper investigates how the vision of the Semantic Web can be carried over to the realm of email. We introduce a general notion of semantic email, in which an email message co...
Luke McDowell, Oren Etzioni, Alon Y. Halevy, Henry...