Sciweavers

3040 search results - page 125 / 608
» Independent Natural Extension
Sort
View
ASIACRYPT
2008
Springer
13 years 11 months ago
Generalized Identity Based and Broadcast Encryption Schemes
Abstract. We provide a general framework for constructing identitybased and broadcast encryption systems. In particular, we construct a general encryption system called spatial enc...
Dan Boneh, Michael Hamburg
ECAI
2008
Springer
13 years 11 months ago
Determining Automatically the Size of Learned Ontologies
Determining the size of an ontology that is automatically learned from texts is an open issue. In this paper, we study the similarity between ontology concepts at different levels ...
Elias Zavitsanos, Sergios Petridis, Georgios Palio...
FIW
2007
120views Communications» more  FIW 2007»
13 years 10 months ago
How to Guarantee Service Cooperation in Dynamic Environments?
The rise of communicating devices has led to more and more machine to machine applications. In this context devices can be modeled using serviceoriented computing. Furthermore serv...
Lionel Touseau
HCI
2007
13 years 10 months ago
Serial Hanging Out: Rapid Ethnographic Needs Assessment in Rural Settings
This paper presents an ethnographic method for assessing user needs in designing for rural settings. “Serial Hanging Out” consists of short-term participant observation with mu...
Jaspal S. Sandhu, P. Altankhuyag, D. Amarsaikhan
NIPS
1994
13 years 10 months ago
Factorial Learning and the EM Algorithm
Many real world learning problems are best characterized by an interaction of multiple independent causes or factors. Discovering such causal structure from the data is the focus ...
Zoubin Ghahramani