Sciweavers

933 search results - page 96 / 187
» Sharing User Models for Adaptive Hypermedia Applications
Sort
View
ASIACRYPT
2005
Springer
15 years 10 months ago
Identity-Based Hierarchical Strongly Key-Insulated Encryption and Its Application
In this paper, we discuss non-interactive updating of decryption keys in identity-based encryption (IBE). IBE is a public key cryptosystem where a public key is an arbitrary strin...
Yumiko Hanaoka, Goichiro Hanaoka, Junji Shikata, H...
167
Voted
PERCOM
2010
ACM
15 years 2 months ago
A 3-layer architecture for smart environment models
— Enriched with more and more intelligent devices modern homes rapidly transform into smart environments. Their growing capabilities enable the implementation of a new generation...
Grzegorz Lehmann, Andreas Rieger, Marco Blumendorf...
AICCSA
2008
IEEE
261views Hardware» more  AICCSA 2008»
15 years 11 months ago
Measuring quality of experience for MPEG-21-based cross-layer multimedia content adaptation
The aim of this paper is to describe a Quality of Service (QoS) model enabling to measure the perceptual quality of video transmissions by exploiting metrics from different layers...
Christian Timmerer, Víctor H. Ortega, Jose ...
134
Voted
WWW
2005
ACM
16 years 5 months ago
Adaptive query routing in peer web search
An unstructured peer network application was proposed to address the query forwarding problem of distributed search engines and scalability limitations of centralized search engin...
Le-Shin Wu, Ruj Akavipat, Filippo Menczer
CCS
2001
ACM
15 years 9 months ago
The performance of public key-enabled kerberos authentication in mobile computing applications
Authenticating mobile computing users can require a significant amount of processing and communications resources— particularly when protocols based on public key encryption are...
Alan Harbitter, Daniel A. Menascé