Sciweavers

2421 search results - page 133 / 485
» Message from the Co-Chairs
Sort
View
IUI
2009
ACM
14 years 4 months ago
Discovering frequent work procedures from resource connections
Intelligent desktop assistants could provide more help for users if they could learn models of the users’ workflows. However, discovering desktop workflows is difficult becau...
Jianqiang Shen, Erin Fitzhenry, Thomas G. Dietteri...
ICICS
2003
Springer
14 years 2 months ago
ID-Based Distributed "Magic Ink" Signature from Pairings
The advantage of ID-based system is the simplification of key distribution and certification management; a user can directly use his identity as his public key instead of an arbi...
Yan Xie, Fangguo Zhang, Xiaofeng Chen, Kwangjo Kim
ICS
2010
Tsinghua U.
14 years 6 months ago
Proof-Carrying Data and Hearsay Arguments from Signature Cards
: Design of secure systems can often be expressed as ensuring that some property is maintained at every step of a distributed computation among mutually-untrusting parties. Special...
Alessandro Chiesa, Eran Tromer
SECON
2008
IEEE
14 years 3 months ago
Fast Exclusion of Errant Devices from Vehicular Networks
—Vehicular networks, in which cars communicate wirelessly to exchange information on traffic conditions, offer a promising way to improve road safety. Yet ensuring the correct f...
Tyler Moore, Maxim Raya, Jolyon Clulow, Panagiotis...
ICDE
2007
IEEE
94views Database» more  ICDE 2007»
14 years 10 months ago
RoXSum: Leveraging Data Aggregation and Batch Processing for XML Routing
Content-based routing is the primary form of communication within publish/subscribe systems. In those systems data transmission is performed by sophisticated overlay networks of c...
Zografoula Vagena, Mirella Moura Moro, Vassilis J....