Sciweavers

2421 search results - page 37 / 485
» Message from the Co-Chairs
Sort
View
COLING
2008
13 years 9 months ago
Normalizing SMS: are Two Metaphors Better than One ?
Electronic written texts used in computermediated interactions (e-mails, blogs, chats, etc) present major deviations from the norm of the language. This paper presents an comparat...
Catherine Kobus, François Yvon, Géra...
CTRSA
2007
Springer
171views Cryptology» more  CTRSA 2007»
13 years 9 months ago
Compact E-Cash from Bounded Accumulator
Abstract. Known compact e-cash schemes are constructed from signature schemes with efficient protocols and verifiable random functions. In this paper, we introduce a different ap...
Man Ho Au, Qianhong Wu, Willy Susilo, Yi Mu
CEAS
2011
Springer
12 years 7 months ago
Blocking spam by separating end-user machines from legitimate mail server machines
Spamming botnets present a critical challenge in the control of spam messages due to the sheer volume and wide spread of the botnet members. In this paper we advocate the approach...
Fernando Sanchez, Zhenhai Duan, Yingfei Dong
ASIACRYPT
2009
Springer
13 years 11 months ago
Proofs of Storage from Homomorphic Identification Protocols
Proofs of storage (PoS) are interactive protocols allowing a client to verify that a server faithfully stores a file. Previous work has shown that proofs of storage can be constru...
Giuseppe Ateniese, Seny Kamara, Jonathan Katz
ICWSM
2009
13 years 5 months ago
Compositionality Principle in Recognition of Fine-Grained Emotions from Text
The recognition of personal emotional state or sentiment conveyed through text is the main task we address in our research. The communication of emotions through text messaging an...
Alena Neviarouskaya, Helmut Prendinger, Mitsuru Is...