Sciweavers

3333 search results - page 197 / 667
» New Invariants for Groups
Sort
View
ICICS
2005
Springer
14 years 4 months ago
Secure Multicast Using Proxy Encryption
In a secure multicast communication environment, only valid members belong to the multicast group could decrypt the data. In many previous researches, there is one “group key” ...
Yun-Peng Chiu, Chin-Laung Lei, Chun-Ying Huang
HICSS
2003
IEEE
90views Biometrics» more  HICSS 2003»
14 years 3 months ago
Information Technology Augmentation of The Skilled Facilitator Approach
Work in the new millennium requires globally distributed organizational members to collaborate in groups and make decisions. In general, research has shown that groups that use fa...
Mark Adkins, Robert Younger, Roger Schwarz
ICNP
2000
IEEE
14 years 3 months ago
An Analysis of Packet Loss Correlation in FEC-Enhanced Multicast Trees
We study group loss probabilities of Forward Error Correction (FEC) codes in shared loss multicast communication. We present a new analysis model with explicit state equations usi...
Marc Mosko, J. J. Garcia-Luna-Aceves
UAI
2000
13 years 12 months ago
A Decision Theoretic Approach to Targeted Advertising
A simple advertising strategy that can be used to help increase sales of a product is to mail out special o ers to selected potential customers. Because there is a cost associated...
David Maxwell Chickering, David Heckerman
CSE
2009
IEEE
14 years 5 months ago
A Hybrid Enforcement Model for Group-centric Secure Information Sharing
—Group-Centric Secure Information Sharing (g-SIS) is motivated by the need to dynamically share information amongst a set of authorized users for a specific purpose. Authorized ...
Ram Krishnan, Ravi S. Sandhu