Sciweavers

1610 search results - page 31 / 322
» Identity Based Multisignatures
Sort
View
DAARC
2009
Springer
268views Algorithms» more  DAARC 2009»
14 years 3 months ago
Binding without Identity: Towards a Unified Semantics for Bound and Exempt Anaphors
Expressions such as English himself are interpreted as locally bound anaphors in certain syntactic environments and are exempt from the binding conditions in others. This article p...
Eric Reuland, Yoad Winter
ICC
2009
IEEE
171views Communications» more  ICC 2009»
13 years 6 months ago
IPsec-Based Anonymous Networking: A Working Implementation
Protecting users' privacy is becoming one of the rising issues for the success of future communications. The Internet in particular, with its open architecture, presents sever...
Csaba Király, Renato Lo Cigno
SPW
2004
Springer
14 years 1 months ago
BLIND: A Complete Identity Protection Framework for End-Points
In this paper, we present a security framework that provides identity protection against active and passive attacks for end-points. The framework is based on a two-round-trip authe...
Jukka Ylitalo, Pekka Nikander
LREC
2008
60views Education» more  LREC 2008»
13 years 10 months ago
A Framework for Identity Resolution and Merging for Multi-source Information Extraction
In the context of ontology-based information extraction, identity resolution is the process of deciding whether an instance extracted from text refers to a known entity in the tar...
Milena Yankova, Horacio Saggion, Hamish Cunningham
CORR
2010
Springer
217views Education» more  CORR 2010»
13 years 3 months ago
Semi-Partitioned Hard Real-Time Scheduling with Restricted Migrations upon Identical Multiprocessor Platforms
Algorithms based on semi-partitioned scheduling have been proposed as a viable alternative between the two extreme ones based on global and partitioned scheduling. In particular, ...
François Dorin, Patrick Meumeu Yomsi, Jo&eu...