Sciweavers

2478 search results - page 106 / 496
» Message from the Chair
Sort
View
TCC
2009
Springer
153views Cryptology» more  TCC 2009»
16 years 4 months ago
On the (Im)Possibility of Key Dependent Encryption
We study the possibility of constructing encryption schemes secure under messages that are chosen depending on the key k of the encryption scheme itself. We give the following sep...
Iftach Haitner, Thomas Holenstein
SIGIR
2009
ACM
15 years 10 months ago
It pays to be picky: an evaluation of thread retrieval in online forums
Online forums host a rich information exchange, often with contributions from many subject matter experts. In this work we evaluate algorithms for thread retrieval in a large and ...
Jonathan L. Elsas, Jaime G. Carbonell
SECON
2007
IEEE
15 years 10 months ago
Multi-user Broadcast Authentication in Wireless Sensor Networks
— Broadcast authentication is a critical security service in wireless sensor networks (WSNs), as it allows the mobile users of WSNs to broadcast messages to multiple sensor nodes...
Kui Ren, Wenjing Lou, Yanchao Zhang
HICSS
1996
IEEE
84views Biometrics» more  HICSS 1996»
15 years 8 months ago
The Development of FEDI in Switzerland: A Life-Cycle Approach
Four major Swiss banks have recently introduced a new financial electronic data interchange (FEDI) service based on UN/EDIFACT and are now trying to convince their corporate custo...
Ivo Cathomen, Stefan Klein
CVPR
2009
IEEE
1468views Computer Vision» more  CVPR 2009»
16 years 11 months ago
Hardware-Efficient Belief Propagation
Belief propagation (BP) is an effective algorithm for solving energy minimization problems in computer vision. However, it requires enormous memory, bandwidth, and computation beca...
Chao-Chung Cheng, Chia-Kai Liang, Homer H. Chen, L...