Sciweavers

2372 search results - page 400 / 475
» Probabilistic calling context
Sort
View
IACR
2011
129views more  IACR 2011»
12 years 7 months ago
Bounded Vector Signatures and their Applications
Although malleability is undesirable in traditional digital signatures, schemes with limited malleability properties enable interesting functionalities that may be impossible to o...
Lei Wei, Scott E. Coull, Michael K. Reiter
CSCW
2012
ACM
12 years 3 months ago
Predicting tie strength in a new medium
We have friends we consider very close and acquaintances we barely know. The social sciences use the term tie strength to denote this differential closeness with the people in our...
Eric Gilbert
HICSS
2012
IEEE
285views Biometrics» more  HICSS 2012»
12 years 3 months ago
Identifying Informational Needs for Open Government: The Case of Egypt
The success of open government initiatives depends on understanding the informational needs of the concerned citizens and other stakeholders as prerequisite for open access to rel...
Ralf Klischewski
HPCA
2012
IEEE
12 years 3 months ago
BulkSMT: Designing SMT processors for atomic-block execution
Multiprocessor architectures that continuously execute atomic blocks (or chunks) of instructions can improve performance and software productivity. However, all of the prior propo...
Xuehai Qian, Benjamin Sahelices, Josep Torrellas
PODS
2012
ACM
244views Database» more  PODS 2012»
11 years 10 months ago
A rigorous and customizable framework for privacy
In this paper we introduce a new and general privacy framework called Pufferfish. The Pufferfish framework can be used to create new privacy definitions that are customized t...
Daniel Kifer, Ashwin Machanavajjhala