Sciweavers

2421 search results - page 94 / 485
» Message from the Co-Chairs
Sort
View
CRYPTO
2004
Springer
130views Cryptology» more  CRYPTO 2004»
14 years 1 months ago
Signature Schemes and Anonymous Credentials from Bilinear Maps
Abstract. We propose a new and efficient signature scheme that is provably secure in the plain model. The security of our scheme is based on a discrete-logarithm-based assumption p...
Jan Camenisch, Anna Lysyanskaya
UM
2010
Springer
14 years 1 months ago
Bayesian Credibility Modeling for Personalized Recommendation in Participatory Media
In this paper, we focus on the challenge that users face in processing messages on the web posted in participatory media settings, such as blogs. It is desirable to recommend to us...
Aaditeshwar Seth, Jie Zhang, Robin Cohen
FASE
2010
Springer
14 years 2 months ago
Evaluating Ordering Heuristics for Dynamic Partial-Order Reduction Techniques
Actor programs consist of a number of concurrent objects called actors, which communicate by exchanging messages. Nondeterminism in actors results from the different possible orde...
Steven Lauterburg, Rajesh K. Karmani, Darko Marino...
EDCC
2005
Springer
14 years 1 months ago
Performance Evaluation of Consistent Recovery Protocols Using MPICH-GF
This paper presents an implementation of several consistent protocols at the abstract device level and their performance comparison. We have performed experiments using three NAS P...
Namyoon Woo, Hyungsoo Jung, Dongin Shin, Hyuck Han...
COOPIS
2002
IEEE
14 years 27 days ago
A Filter Object Framework for MICO
Abstract. Filtered delivery model of message passing in an objectoriented distributed computing environment facilitates separation of message control from message processing in a t...
Pranav S. Nabar, Amit L. Padalkar, Rushikesh K. Jo...