Sciweavers

644 search results - page 94 / 129
» Translation the Wiki way
Sort
View
TCC
2004
Springer
173views Cryptology» more  TCC 2004»
14 years 1 months ago
Soundness of Formal Encryption in the Presence of Active Adversaries
Abstract. We present a general method to prove security properties of cryptographic protocols against active adversaries, when the messages exchanged by the honest parties are arbi...
Daniele Micciancio, Bogdan Warinschi
XSYM
2004
Springer
115views Database» more  XSYM 2004»
14 years 1 months ago
XQuery Processing with Relevance Ranking
Abstract. We are presenting a coherent framework for XQuery processing that incorporates IR-style approximate matching and allows the ordering of results by their relevance score. ...
Leonidas Fegaras
CW
2003
IEEE
14 years 1 months ago
Disappearing Computers, Social Actors and Embodied Agents
Presently, there are user interfaces that allow multimodal interactions. Many existing research and prototype systems introduced embodied agents, assuming that they allow a more n...
Anton Nijholt
P2P
2003
IEEE
146views Communications» more  P2P 2003»
14 years 1 months ago
The Deployment of Cache Servers in P2P Networks for Improved Performance in Content-Delivery
The peer-to-peer (P2P) model generally requires that bidirectional and direct communications for contentdelivery be set up between user peers after discovery of the desired conten...
Tetsuya Oh-ishi, Koji Sakai, Tetsuya Iwata, Akira ...
SAC
2003
ACM
14 years 1 months ago
Image Retrieval With Embedded Region Relationships
Image retrieval based on content from digital libraries, multimedia databases, the Internet, and other sources has been an important problem addressed by several researchers. In t...
Sharat Chandran, Naga Kiran