Sciweavers

187 search results - page 4 / 38
» Utility-Based Role Exchange
Sort
View
FLAIRS
2004
13 years 8 months ago
Reasoning about Beliefs, Observability, and Information Exchange in Teamwork
Communication is an important aspect of teamwork, both in human teams and in multi-agent teams. One of the most vital roles for communication is for information exchange, such as ...
Thomas R. Ioerger
ACNS
2010
Springer
200views Cryptology» more  ACNS 2010»
14 years 6 days ago
Deniable Internet Key Exchange
In this work, we develop a family of protocols for deniable Internet Key-Exchange (IKE) with the following properties: • Highly practical efficiency, and conceptual simplicity a...
Andrew Chi-Chih Yao, Yunlei Zhao
PVLDB
2010
96views more  PVLDB 2010»
13 years 5 months ago
Scalable Data Exchange with Functional Dependencies
The recent literature has provided a solid theoretical foundation for the use of schema mappings in data-exchange applications. Following this formalization, new algorithms have b...
Bruno Marnette, Giansalvatore Mecca, Paolo Papotti
CRYPTO
2006
Springer
155views Cryptology» more  CRYPTO 2006»
13 years 11 months ago
A Method for Making Password-Based Key Exchange Resilient to Server Compromise
This paper considers the problem of password-authenticated key exchange (PAKE) in a client-server setting, where the server authenticates using a stored password file, and it is de...
Craig Gentry, Philip D. MacKenzie, Zulfikar Ramzan
MM
2009
ACM
178views Multimedia» more  MM 2009»
14 years 1 days ago
Automatic role recognition in multiparty recordings using social networks and probabilistic sequential models
The automatic analysis of social interactions is attracting significant interest in the multimedia community. This work addresses one of the most important aspects of the problem...
Sarah Favre, Alfred Dielmann, Alessandro Vinciarel...