Sciweavers

2927 search results - page 171 / 586
» Secure Distributed Human Computation
Sort
View
ICDCS
2010
IEEE
14 years 11 months ago
Secure Ranked Keyword Search over Encrypted Cloud Data
As Cloud Computing becomes prevalent, sensitive information are being increasingly centralized into the cloud. For the protection of data privacy, sensitive data has to be encrypte...
Cong Wang, Ning Cao, Jin Li, Kui Ren, Wenjing Lou
CHI
2005
ACM
16 years 2 months ago
Traveling blues: the effect of relocation on partially distributed teams
This experimental study looks at how relocation affected the collaboration patterns of partially-distributed work groups. Partially distributed teams have part of their membership...
Nathan Bos, Judith S. Olson, Arik Cheshin, Yong-Su...
GECCO
2004
Springer
175views Optimization» more  GECCO 2004»
15 years 7 months ago
Enhanced Innovation: A Fusion of Chance Discovery and Evolutionary Computation to Foster Creative Processes and Decision Making
Abstract. Human-based genetic algorithms are powerful tools for organizational modeling. If we enhance them using chance discovery techniques, we obtain an innovative approach for ...
Xavier Llorà, Kei Ohnishi, Ying-Ping Chen, ...
100
Voted
COMPUTER
2010
147views more  COMPUTER 2010»
15 years 2 months ago
Authentication by Biometric Verification
:-Biometrics is the science and technology of measuring and analyzing biological data. In information technology, biometrics refers to technologies that measure and analyze human b...
Ron Vetter
128
Voted
IMA
1997
Springer
211views Cryptology» more  IMA 1997»
15 years 6 months ago
Key Agreement Protocols and Their Security Analysis
This paper proposes new protocols for two goals: authenticated key agreement and authenticated key agreement with key con rmation in the asymmetric public-key setting. A formalm...
Simon Blake-Wilson, Don Johnson, Alfred Menezes