Sciweavers

2372 search results - page 432 / 475
» Probabilistic calling context
Sort
View
IPPS
2007
IEEE
14 years 2 months ago
Pseudo Trust: Zero-Knowledge Based Authentication in Anonymous Peer-to-Peer Protocols
Most of the current trust models in peer-to-peer (P2P) systems are identity based, which means that in order for one peer to trust another, it needs to know the other peer’s ide...
Li Lu, Jinsong Han, Lei Hu, Jinpeng Huai, Yunhao L...
SP
2007
IEEE
105views Security Privacy» more  SP 2007»
14 years 2 months ago
Multi-Dimensional Range Query over Encrypted Data
We design an encryption scheme called Multi-dimensional Range Query over Encrypted Data (MRQED), to address the privacy concerns related to the sharing of network audit logs and v...
Elaine Shi, John Bethencourt, Hubert T.-H. Chan, D...
EDUTAINMENT
2007
Springer
14 years 1 months ago
A Hybrid of Plot-Based and Character-Based Interactive Storytelling
Interactive storytelling in the virtual environment attracts a lot of research interests in recent years. Story plot and character are two most important elements of a story. Based...
Yundong Cai, Chunyan Miao, Ah-Hwee Tan, Zhiqi Shen
EMSOFT
2007
Springer
14 years 1 months ago
Proving the absence of run-time errors in safety-critical avionics code
We explain the design of the interpretation-based static analyzer Astr´ee and its use to prove the absence of run-time errors in safety-critical codes. Categories and Subject Des...
Patrick Cousot
RWEB
2007
Springer
14 years 1 months ago
Semantic Descriptions in an Enterprise Search Solution
Today customers want to use powerful search engines for their huge and increasing content repositories. Full-text-only products with simple result lists are not enough to satisfy t...
Uwe Crenze, Stefan Köhler, Kristian Hermsdorf...