Sciweavers

1195 search results - page 182 / 239
» What, Where
Sort
View
CRYPTO
2009
Springer
172views Cryptology» more  CRYPTO 2009»
14 years 2 months ago
Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions
We present a new methodology for proving security of encryption systems using what we call Dual System Encryption. Our techniques result in fully secure Identity-Based Encryption ...
Brent Waters
SIGECOM
2009
ACM
83views ECommerce» more  SIGECOM 2009»
14 years 2 months ago
The price of truthfulness for pay-per-click auctions
We analyze the problem of designing a truthful pay-per-click auction where the click-through-rates (CTR) of the bidders are unknown to the auction. Such an auction faces the class...
Nikhil R. Devanur, Sham M. Kakade
ICRA
2008
IEEE
150views Robotics» more  ICRA 2008»
14 years 2 months ago
A Bayesian approach to empirical local linearization for robotics
— Local linearizations are ubiquitous in the control of robotic systems. Analytical methods, if available, can be used to obtain the linearization, but in complex robotics system...
Jo-Anne Ting, Aaron D'Souza, Sethu Vijayakumar, St...
ABIALS
2008
Springer
14 years 2 months ago
The Cognitive Body: From Dynamic Modulation to Anticipation
Abstract— Starting from the situated and embodied perspective on the study of biological cognition as a source of inspiration, this paper programmatically outlines a path towards...
Alberto Montebelli, Robert Lowe, Tom Ziemke
ICDE
2007
IEEE
107views Database» more  ICDE 2007»
14 years 2 months ago
An Integrated Platform for Spatial Data Mining within a GIS Environment
The strength of GIS is in providing a rich data infrastructure for combining disparate data in meaningful ways by using a spatial arrangement (e.g., proximity). As a toolbox, a GI...
Annalisa Appice, Antonietta Lanza, Donato Malerba