Sciweavers

4415 search results - page 34 / 883
» How to Pair with a Human
Sort
View
LREC
2008
108views Education» more  LREC 2008»
14 years 12 days ago
Creating a Research Collection of Question Answer Sentence Pairs with Amazon's Mechanical Turk
Each year NIST releases a set of question, document id, answer-triples for the factoid questions used in the TREC Question Answering track. While this resource is widely used and ...
Michael Kaisser, John Lowe
COMCOM
2011
13 years 6 months ago
TinyPBC: Pairings for authenticated identity-based non-interactive key distribution in sensor networks
Key distribution in Wireless Sensor Networks (WSNs) is challenging. Symmetric cryptosystems can perform it efficiently, but they often do not provide a perfect trade-off between ...
Leonardo B. Oliveira, Diego F. Aranha, Conrado Por...
ICDM
2009
IEEE
109views Data Mining» more  ICDM 2009»
14 years 5 months ago
Finding Associations and Computing Similarity via Biased Pair Sampling
Sampling-based methods have previously been proposed for the problem of finding interesting associations in data, even for low-support items. While these methods do not guarantee ...
Andrea Campagna, Rasmus Pagh
FC
2007
Springer
136views Cryptology» more  FC 2007»
14 years 5 months ago
Usability Analysis of Secure Pairing Methods
Setting up security associations between end-user devices is a challenging task when it needs to be done by ordinary users. The increasing popularity of powerful personal electroni...
Ersin Uzun, Kristiina Karvonen, N. Asokan
SP
2003
IEEE
136views Security Privacy» more  SP 2003»
14 years 4 months ago
Secret Handshakes from Pairing-Based Key Agreements
Consider a CIA agent who wants to authenticate herself to a server, but does not want to reveal her CIA credentials unless the server is a genuine CIA outlet. Consider also that t...
Dirk Balfanz, Glenn Durfee, Narendar Shankar, Dian...