Sciweavers

330 search results - page 52 / 66
» On the Notion of Pseudo-Free Groups
Sort
View
PERCOM
2006
ACM
14 years 9 months ago
Context and Location-Aware Encryption for Pervasive Computing Environments
Pervasive computing promises to revolutionize computing, empower mobile users, and enhance mobility, customizability and adaptability of computing environments. Intrinsic to the n...
Jalal Al-Muhtadi, Raquel L. Hill, Roy H. Campbell,...
SDM
2009
SIAM
167views Data Mining» more  SDM 2009»
14 years 6 months ago
Detecting Communities in Social Networks Using Max-Min Modularity.
Many datasets can be described in the form of graphs or networks where nodes in the graph represent entities and edges represent relationships between pairs of entities. A common ...
Jiyang Chen, Osmar R. Zaïane, Randy Goebel
SAC
2010
ACM
14 years 4 months ago
Fast, flexible, and highly resilient genuine fifo and causal multicast algorithms
We study the fifo and causal multicast problem, two group-communication abstractions that deliver messages in an order consistent with their context. With fifo multicast, the co...
Nicolas Schiper, Fernando Pedone
CTRSA
2005
Springer
154views Cryptology» more  CTRSA 2005»
14 years 3 months ago
Fast and Proven Secure Blind Identity-Based Signcryption from Pairings
We present the first blind identity-based signcryption (BIBSC). We formulate its security model and define the security notions of blindness and parallel one-more unforgeability ...
Tsz Hon Yuen, Victor K. Wei
HICSS
2003
IEEE
175views Biometrics» more  HICSS 2003»
14 years 2 months ago
Towards a Strategy for Sense-Making of Empirical Knowledge Management Perceptions - The TFL Methodology
There exists a very diverse range of views and perceptions about KM and a need to appreciate these issues and concerns among different communities of knowledge workers. Our resear...
David Yuh Foong Law, Joo Eng Lee-Partridge