Sciweavers

2927 search results - page 203 / 586
» Secure Distributed Human Computation
Sort
View
ISPA
2005
Springer
15 years 8 months ago
ID-Based Proxy Signature Using Bilinear Pairings
Identity-based (ID-based) public key cryptosystem can be a good alternative for certificate-based public key setting, especially when efficient key management and moderate securit...
Jing Xu, Zhenfeng Zhang, Dengguo Feng
117
Voted
PDP
2003
IEEE
15 years 7 months ago
CYCLADES: A Distributed System for Virtual Community Support Based on Open Archives
This paper is about support for the exchange of information and knowledge among researchers. We introduce the concepts of open archives and grey literature, which provide valuable...
Tom Gross
113
Voted
ICIAP
2005
ACM
16 years 2 months ago
Interactive, Mobile, Distributed Pattern Recognition
As the accuracy of conventional classifiers, based only on a static partitioning of feature space, appears to be approaching a limit, it may be useful to consider alternative appro...
George Nagy
143
Voted
AAAI
2004
15 years 4 months ago
Distributed Representation of Syntactic Structure by Tensor Product Representation and Non-Linear Compression
Representing lexicons and sentences with the subsymbolic approach (using techniques such as Self Organizing Map (SOM) or Artificial Neural Network (ANN)) is a relatively new but i...
Heidi H. T. Yeung, Peter W. M. Tsang
87
Voted
NORDICHI
2004
ACM
15 years 8 months ago
Supporting the distributed family: the need for a conversational context
Two studies on how to support communication between grandparents and grandchildren are presented. The first study, an interview with 12 parents, investigates the conversation betw...
Bente Evjemo, Gunnvald B. Svendsen, Eivind Rinde, ...