Sciweavers

82 search results - page 5 / 17
» Position statement
Sort
View
EUROCRYPT
2006
Springer
13 years 11 months ago
Composition Implies Adaptive Security in Minicrypt
To prove that a secure key-agreement protocol exists one must at least show P = NP. Moreover any proof that the sequential composition of two non-adaptively secure pseudorandom fun...
Krzysztof Pietrzak
DAGSTUHL
2007
13 years 9 months ago
Sensor Technologies for AL Systems Integrated Health Monitoring and Emergency Call System
Most developed countries are facing an ageing population, leading to an increasing demand on both health care and social welfare systems. There is a general agreement that these in...
Roc Berenguer
EJC
2003
13 years 9 months ago
An Algebraic Approach for Specifying Compound Terms in Faceted Taxonomies
Abstract. A faceted taxonomy is a set of taxonomies, each describing a given domain from a different aspect, or facet. The indexing of domain objects is done through conjunctive c...
Yannis Tzitzikas, Anastasia Analyti, Nicolas Spyra...
BPM
2006
Springer
132views Business» more  BPM 2006»
13 years 9 months ago
Product-Driven Enterprise Interoperability for Manufacturing Systems Integration
The "Babel tower effect", induced by the heterogeneity of applications available in the operation of enterprises brings to a consistent lack of "exchangeability"...
Michele Dassisti, Hervé Panetto, Angela Tur...
KDD
2002
ACM
175views Data Mining» more  KDD 2002»
14 years 8 months ago
Mining product reputations on the Web
Knowing the reputations of your own and/or competitors' products is important for marketing and customer relationship management. It is, however, very costly to collect and a...
Satoshi Morinaga, Kenji Yamanishi, Kenji Tateishi,...