Sciweavers

2702 search results - page 114 / 541
» Message from the Editor
Sort
View
CBSE
2005
Springer
14 years 3 months ago
Real-Time Scheduling Techniques for Implementation Synthesis from Component-Based Software Models
We consider a class of component-based software models with interaction style of buffered asynchronous message passing between components with ports, represented by UML-RT. After ...
Zonghua Gu, Zhimin He
EUROCRYPT
2004
Springer
14 years 3 months ago
Sequential Aggregate Signatures from Trapdoor Permutations
An aggregate signature scheme (recently proposed by Boneh, Gentry, Lynn, and Shacham) is a method for combining n signatures from n different signers on n different messages int...
Anna Lysyanskaya, Silvio Micali, Leonid Reyzin, Ho...
CISC
2007
Springer
129views Cryptology» more  CISC 2007»
14 years 2 months ago
Efficient Public Key Encryption with Keyword Search Schemes from Pairings
Public key encryption with keyword search (PEKS) enables user Alice to send a secret key TW to a server that will enable the server to locate all encrypted messages containing the...
Chunxiang Gu, Yuefei Zhu, Heng Pan
HCI
2007
13 years 11 months ago
Using Social Metadata in Email Triage: Lessons from the Field
Email archives are full of social information, including how messages are addressed and frequency of contact between senders and receivers. To study the use of this rich metadata ...
Danyel Fisher, A. J. Bernheim Brush, Bernie Hogan,...
ACL
2010
13 years 8 months ago
Inducing Domain-Specific Semantic Class Taggers from (Almost) Nothing
This research explores the idea of inducing domain-specific semantic class taggers using only a domain-specific text collection and seed words. The learning process begins by indu...
Ruihong Huang, Ellen Riloff