Sciweavers

897 search results - page 59 / 180
» Identity: How to name it, How to find it
Sort
View
SSD
1997
Springer
131views Database» more  SSD 1997»
14 years 26 days ago
Topological Error Correcting in GIS
It is agreed upon that topological relations ore of great importance regarding to GIS data sets consistency. A lot of errors that can be found in GIS data sets are coming from a l...
Thierry Ubeda, Max J. Egenhofer
CSCW
2012
ACM
12 years 4 months ago
Coordination and beyond: social functions of groups in open content production
We report on a study of the English edition of Wikipedia in which we used a mixed methods approach to understand how nested organizational structures called WikiProjects support c...
Andrea Forte, Niki Kittur, Vanessa Larco, Haiyi Zh...
STACS
2010
Springer
14 years 3 months ago
Weakening Assumptions for Deterministic Subexponential Time Non-Singular Matrix Completion
Kabanets and Impagliazzo [KI04] show how to decide the circuit polynomial identity testing problem (CPIT) in deterministic subexponential time, assuming hardness of some explicit ...
Maurice Jansen
PKC
2009
Springer
129views Cryptology» more  PKC 2009»
14 years 1 months ago
Zero-Knowledge Proofs with Witness Elimination
Abstract. Zero-knowledge proofs with witness elimination are protocols that enable a prover to demonstrate knowledge of a witness to the verifier that accepts the interaction prov...
Aggelos Kiayias, Hong-Sheng Zhou
DIM
2005
ACM
13 years 10 months ago
Pseudonym management using mediated identity-based cryptography
Mobile Location-Based Services (LBS) have raised privacy concerns amongst mobile phone users who may need to supply their identity and location information to untrustworthy third ...
Thibault Candebat, Cameron Ross Dunne, David T. Gr...