Sciweavers

16843 search results - page 18 / 3369
» On Generalized Authorization Problems
Sort
View
STOC
2006
ACM
152views Algorithms» more  STOC 2006»
14 years 8 months ago
Private approximation of search problems
Many approximation algorithms have been presented in the last decades for hard search problems. The focus of this paper is on cryptographic applications, where it is desired to de...
Amos Beimel, Paz Carmi, Kobbi Nissim, Enav Weinreb
ANOR
2010
112views more  ANOR 2010»
13 years 8 months ago
The Multi-Story Space Assignment Problem
-- The Multi-Story Space Assignment Problem (MSAP) is an innovative formulation of the multi-story facility assignment problem that allows one to model the location of departments ...
Peter M. Hahn, J. MacGregor Smith, Yi-Rong Zhu
DEXAW
2007
IEEE
118views Database» more  DEXAW 2007»
14 years 2 months ago
Author Identification Using Imbalanced and Limited Training Texts
This paper deals with the problem of author identification. The Common N-Grams (CNG) method [6] is a language-independent profile-based approach with good results in many author i...
Efstathios Stamatatos
MKM
2004
Springer
14 years 1 months ago
CPoint: Dissolving the Author's Dilemma
Abstract. Automated knowledge management techniques critically depend on the availability of semantically enhanced documents which are hard to come by in practice. Starting from a ...
Andrea Kohlhase, Michael Kohlhase
CCS
2007
ACM
14 years 2 months ago
Alpaca: extensible authorization for distributed services
Traditional Public Key Infrastructures (PKI) have not lived up to their promise because there are too many ways to define PKIs, too many cryptographic primitives to build them wi...
Chris Lesniewski-Laas, Bryan Ford, Jacob Strauss, ...