Sciweavers

211 search results - page 12 / 43
» Towards Security Evaluation Based on Evidence Collection
Sort
View
TCC
2009
Springer
142views Cryptology» more  TCC 2009»
14 years 8 months ago
Chosen-Ciphertext Security via Correlated Products
We initiate the study of one-wayness under correlated products. We are interested in identifying necessary and sufficient conditions for a function f and a distribution on inputs ...
Alon Rosen, Gil Segev
ECR
2010
112views more  ECR 2010»
13 years 7 months ago
TREET: the Trust and Reputation Experimentation and Evaluation Testbed
Abstract To date, trust and reputation systems have often been evaluated using methods of their designers' own devising. Recently, we demonstrated that a number of noteworthy ...
Reid Kerr, Robin Cohen
IFIPTM
2009
149views Management» more  IFIPTM 2009»
13 years 5 months ago
An Experimental Testbed for Evaluation of Trust and Reputation Systems
Abstract. To date, trust and reputation systems have often been evaluated using methods of their designers' own devising. Recently, we demonstrated that a number of noteworthy...
Reid Kerr, Robin Cohen
PCM
2009
Springer
97views Multimedia» more  PCM 2009»
14 years 2 months ago
Evaluating a Multimedia-Based Tele-Ophthalmology System
In a conventional eye department of hospital, an optometrist samples the eyes of a patient with medical instruments (e.g. camera, ophthalmoscope), and then delivers the medical rec...
Yongdong Wu, Haixia Yao, Zhigang Zhao
ERCIMDL
2007
Springer
110views Education» more  ERCIMDL 2007»
14 years 1 months ago
Annotation-Based Document Retrieval with Probabilistic Logics
Annotations are an important part in today’s digital libraries and Web information systems as an instrument for interactive knowledge creation. Annotation-based document retrieva...
Ingo Frommholz