Sciweavers

1375 search results - page 189 / 275
» eg 2006
Sort
View
EUROPKI
2006
Springer
14 years 2 months ago
Pseudonymous PKI for Ubiquitous Computing
Privacy-aware Public Key Infrastructure (PKI) can maintain user access control and yet protect user privacy, which is envisioned as a promising technique in many emerging applicat...
Ke Zeng
EWCBR
2006
Springer
14 years 2 months ago
Rough Set Feature Selection Algorithms for Textual Case-Based Classification
Feature selection algorithms can reduce the high dimensionality of textual cases and increase case-based task performance. However, conventional algorithms (e.g., information gain)...
Kalyan Moy Gupta, David W. Aha, Philip Moore
FC
2006
Springer
108views Cryptology» more  FC 2006»
14 years 2 months ago
Uncheatable Reputation for Distributed Computation Markets
Reputation systems aggregate mutual feedback of interacting peers into a "reputation" metric for each participant. This is then available to prospective service "req...
Bogdan Carbunar, Radu Sion
FINTAL
2006
14 years 2 months ago
Analysis of EU Languages Through Text Compression
In this article, we are studying the differences between the European languages using statistical and unsupervised methods. The analysis is conducted in different levels of languag...
Kimmo Kettunen, Markus Sadeniemi, Tiina Lindh-Knuu...
FM
2006
Springer
126views Formal Methods» more  FM 2006»
14 years 2 months ago
Towards Modularized Verification of Distributed Time-Triggered Systems
Abstract. The correctness of a system according to a given specification is essential, especially for safety-critical applications. One such typical application domain is the autom...
Jewgenij Botaschanjan, Alexander Gruler, Alexander...