Sciweavers

341 search results - page 66 / 69
» The Role of Semantic Locations for Mobile Information Access
Sort
View
JCDL
2005
ACM
152views Education» more  JCDL 2005»
14 years 28 days ago
In the company of readers: the digital library book as "practiced place"
Most digital libraries (DLs) necessarily focus on the complex issues that arise when library collections are freed from their physical anchors in buildings and on paper. Typical i...
Nancy Kaplan, Yoram Chisik
CANS
2010
Springer
150views Cryptology» more  CANS 2010»
13 years 5 months ago
Predicate Encryption with Partial Public Keys
Abstract. Predicate encryption is a new powerful cryptographic primitive which allows for fine-grained access control for encrypted data: the owner of the secret key can release pa...
Carlo Blundo, Vincenzo Iovino, Giuseppe Persiano
CIKM
2009
Springer
14 years 4 hour ago
iMecho: an associative memory based desktop search system
Traditional desktop search engines only support keyword based search that needs exact keyword matching to find resources. However, users generally have a vague picture of what is...
Jidong Chen, Hang Guo, Wentao Wu, Wei Wang 0009
ESOP
2008
Springer
13 years 9 months ago
A Formal Implementation of Value Commitment
In an optimistic approach to security, one can often simplify protocol design by relying on audit logs, which can be analyzed a posteriori. Such auditing is widely used in practice...
Cédric Fournet, Nataliya Guts, Francesco Za...
IAAI
2001
13 years 8 months ago
Electric Elves: Applying Agent Technology to Support Human Organizations
The operation of a human organization requires dozens of everyday tasks to ensure coherence in organizational activities, to monitor the status of such activities, to gather infor...
Hans Chalupsky, Yolanda Gil, Craig A. Knoblock, Kr...