Sciweavers

739 search results - page 45 / 148
» Information Flow in Credential Systems
Sort
View
CISC
2008
Springer
152views Cryptology» more  CISC 2008»
13 years 9 months ago
Privacy for Private Key in Signatures
One of the important applications of digital signature is anonymous credential or pseudonym system. In these scenarios, it is essential that the identity of the signer is kept secr...
Qianhong Wu, Bo Qin, Yi Mu, Willy Susilo
HUC
2010
Springer
13 years 8 months ago
Convenience probe: a participatory sensing tool to collect large-scale consumer flow behaviors
This paper proposes Convenience Probe, a participatory sensing tool to collect large-scale consumer flow behaviors from everyday mobile phones. We hope to use Convenience Probe to...
Chuang-Wen You, Chih-Chiang Wei, Yu-Han Chen, Jya-...
CDC
2009
IEEE
161views Control Systems» more  CDC 2009»
13 years 8 months ago
Quadratic Programming based data assimilation with passive drifting sensors for shallow water flows
We present a method for assimilating Lagrangian sensor measurement data into a Shallow Water Equation model. Using our method, the variational data assimilation problem is formulat...
Andrew Tinka, Issam S. Strub, Qingfang Wu, Alexand...
CDC
2010
IEEE
147views Control Systems» more  CDC 2010»
13 years 2 months ago
Asymmetric information diffusion via gossiping on static and dynamic networks
In this paper we consider the problem of gossiping in a network to diffuse the average of a sub-set of nodes, called sources, and directing it to another sub-set of nodes in the ne...
Mehmet Ercan Yildiz, Anna Scaglione, Asuman E. Ozd...
CORR
2010
Springer
146views Education» more  CORR 2010»
13 years 7 months ago
Liberalizing Dependency
Abstract. The dependency core calculus (DCC), a simple extension of the computational lambda calculus, captures a common notion of dependency that arises in many programming langua...
Avik Chaudhuri