Sciweavers

2421 search results - page 286 / 485
» Message from the Co-Chairs
Sort
View
AAAI
2008
14 years 1 months ago
RADAR: A Personal Assistant that Learns to Reduce Email Overload
Email client software is widely used for personal task management, a purpose for which it was not designed and is poorly suited. Past attempts to remedy the problem have focused o...
Michael Freed, Jaime G. Carbonell, Geoffrey J. Gor...
ECCC
1998
118views more  ECCC 1998»
13 years 10 months ago
Chinese Remaindering with Errors
The Chinese Remainder Theorem states that a positive integer m is uniquely speci ed by its remainder modulo k relatively prime integers p1;:::;pk, provided m < Qk i=1 pi. Thus ...
Oded Goldreich, Dana Ron, Madhu Sudan
PERCOM
2004
ACM
14 years 10 months ago
Pervasive Enablement of Business Processes
People are an important part of many business processes. Current workflow-based implementations of business processes constrain users to the desktop environment; require them to p...
Dipanjan Chakraborty, Hui Lei
ICST
2009
IEEE
14 years 5 months ago
Test Input Generation Using UML Sequence and State Machines Models
We propose a novel testing approach that combines information from UML sequence models and state machine models. Current approaches that rely solely on sequence models do not cons...
Aritra Bandyopadhyay, Sudipto Ghosh
ACNS
2008
Springer
132views Cryptology» more  ACNS 2008»
14 years 5 months ago
Generic Security-Amplifying Methods of Ordinary Digital Signatures
We describe two new paradigms on how to obtain ordinary signatures that are secure against existential forgery under adaptively chosen message attacks (fully-secure, in short), fro...
Jin Li, Kwangjo Kim, Fangguo Zhang, Duncan S. Wong