Sciweavers

2268 search results - page 404 / 454
» The Essence of Form Abstraction
Sort
View
TCC
2007
Springer
125views Cryptology» more  TCC 2007»
14 years 3 months ago
Evaluating Branching Programs on Encrypted Data
Abstract. We present a public-key encryption scheme with the following properties. Given a branching program P and an encryption c of an input x, it is possible to efficiently com...
Yuval Ishai, Anat Paskin
TSD
2007
Springer
14 years 3 months ago
The Intonational Realization of Requests in Polish Task-Oriented Dialogues
available in the Conference Program). 2007: (with E. Jarmołowicz, Z. Malisz i M. Szczyszek) Gesture, Prosody and Lexicon in ented Dialogues: Progress Report. (Poznań Linguistic M...
Maciej Karpinski
AGILEDC
2006
IEEE
14 years 3 months ago
Using an Agile Approach in a Large, Traditional Organization
Can Agile approaches be used successfully in large organizations, where traditional methods and high levels of governance are the norm? Although the iterative, agile approaches ha...
Dot Tudor, George A. Walter
DASFAA
2006
IEEE
121views Database» more  DASFAA 2006»
14 years 3 months ago
Distributed Network Querying with Bounded Approximate Caching
Abstract. As networks continue to grow in size and complexity, distributed network monitoring and resource querying are becoming increasingly difficult. Our aim is to design, build...
Badrish Chandramouli, Jun Yang 0001, Amin Vahdat
INFOCOM
2006
IEEE
14 years 3 months ago
Relay Placement for Higher Order Connectivity in Wireless Sensor Networks
Abstract— Sensors typically use wireless transmitters to communicate with each other. However, sensors may be located in a way that they cannot even form a connected network (e.g...
Abhishek Kashyap, Samir Khuller, Mark A. Shayman