Sciweavers

886 search results - page 83 / 178
» Generalized Bezout Identity
Sort
View
CCS
2009
ACM
14 years 4 months ago
Membership-concealing overlay networks
We introduce the concept of membership-concealing overlay networks (MCONs), which hide the real-world identities of participants. We argue that while membership concealment is ort...
Eugene Y. Vasserman, Rob Jansen, James Tyra, Nicho...
CCS
2009
ACM
14 years 4 months ago
Finding "hidden" connections on linkedIn an argument for more pragmatic social network privacy
Social networking services well know that some users are unwilling to freely share the information they store with the service (e.g. profile information). To address this, servic...
Jessica Staddon
CANS
2009
Springer
136views Cryptology» more  CANS 2009»
14 years 3 months ago
Verifying Anonymous Credential Systems in Applied Pi Calculus
Abstract. Anonymous credentials are widely used to certify properties of a credential owner or to support the owner to demand valuable services, while hiding the user’s identity ...
Xiangxi Li, Yu Zhang, Yuxin Deng
GECCO
2009
Springer
113views Optimization» more  GECCO 2009»
14 years 3 months ago
Environmental robustness in multi-agent teams
Evolution has proven to be an effective method of training heterogeneous multi-agent teams of autonomous agents to explore unknown environments. Autonomous, heterogeneous agents ...
Terence Soule, Robert B. Heckendorn
ACMACE
2009
ACM
14 years 3 months ago
Funbrella: recording and replaying vibrations through an umbrella axis
We propose an umbrella-like device called Funbrella that entertains people with many types of rain by focusing on an umbrella as a user interface that connects humans and rain. Ge...
Kazuyuki Fujita, Yuichi Itoh, Ai Yoshida, Maya Oza...