• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 14
Next 10 →

Multi-Authority Attribute Based Encryption

by Melissa Chase
"... Abstract. In an identity based encryption scheme, each user is identified by a unique identity string. An attribute based encryption scheme (ABE), in contrast, is a scheme in which each user is identified by a set of attributes, and some function of those attributes is used to determine decryption a ..."
Abstract - Cited by 114 (1 self) - Add to MetaCart
each authority k. Our scheme can tolerate an arbitrary number of corrupt authoritites. We also show how to apply our techniques to achieve a multiauthority version of the large universe fine grained access control ABE presented by Gopal et al. [GPSW06]. 1

Web Search Via Hub Synthesis

by Dimitris Achlioptas, Amos Fiat, Anna R. Karlin, Frank Mcsherry , 2001
"... We present a model for web search that captures in a unified manner three critical components of the problem: how the link structure of the web is generated, how the content of a web document is generated, and how a human searcher generates a query. The key to this unification lies in capturing the ..."
Abstract - Cited by 34 (0 self) - Add to MetaCart
We present a model for web search that captures in a unified manner three critical components of the problem: how the link structure of the web is generated, how the content of a web document is generated, and how a human searcher generates a query. The key to this unification lies in capturing the correlations between these components in terms of proximity in a shared latent semantic space. Given such a combined model, the correct answer to a search query is well defined, and thus it becomes possible to evaluate web search algorithms rigorously. We present a new web search algorithm, based on spectral techniques, and prove that it is guaranteed to produce an approximately correct answer in our model. The algorithm assumes no knowledge of the model, and is well-defined regardless of the model's accuracy. 1.

Exact, Efficient and Information-Theoretically Secure Voting with an Arbitrary Number of Cheaters

by Anne Broadbent, Stacey Jeffery , 2010
"... We present three voting protocols with unconditional privacy and correctness, without assuming any bound on the number of corrupt participants. All protocols have polynomial complexity and require private channels and a simultaneous broadcast channel. Unlike previously proposed protocols in this mod ..."
Abstract - Add to MetaCart
We present three voting protocols with unconditional privacy and correctness, without assuming any bound on the number of corrupt participants. All protocols have polynomial complexity and require private channels and a simultaneous broadcast channel. Unlike previously proposed protocols

Index

by Traballo Fin De Grao, María Villar Lourido , 2013
"... ..."
Abstract - Add to MetaCart
Abstract not found

unknown title

by unknown authors
"... ..."
Abstract - Add to MetaCart
Abstract not found

unknown title

by unknown authors
"... ..."
Abstract - Add to MetaCart
Abstract not found

Web Search Via Hub Synthesis

by unknown authors
"... Small have continual plodders ever won save base authority from others books. — William Shakespeare, Loves Labours Lost. Act i. Sc. 1. They define themselves in terms of what they oppose. — George Will, On conservatives, Newsweek 30 Sep 74. We present a model for web search that captures in a unifie ..."
Abstract - Add to MetaCart
Small have continual plodders ever won save base authority from others books. — William Shakespeare, Loves Labours Lost. Act i. Sc. 1. They define themselves in terms of what they oppose. — George Will, On conservatives, Newsweek 30 Sep 74. We present a model for web search that captures in a unified manner three critical components of the problem: how the link structure of the web is generated, how the content of a web document is generated, and how a human searcher generates a query. The key to this unification lies in capturing the correlations between these components in terms of proximity in a shared latent semantic space. Given such a combined model, the correct answer to a search query is well defined, and thus it becomes possible to evaluate web search algorithms rigorously. We present a new web search algorithm, based on spectral techniques, and prove that it is guaranteed to produce an approximately correct answer in our model. The algorithm assumes no knowledge of the model, and is well-defined regardless of the model’s accuracy. 1.

THE BAROQUE IN DICKENS AND PROUST By

by Rebecca Lee Yates, Rebecca Lee Yates , 1971
"... This Thesis is brought to you for free and open access by ScholarWorks. It has been accepted for inclusion in Theses, Dissertations, Professional Papers by an authorized administrator of ScholarWorks. For more information, please contact ..."
Abstract - Add to MetaCart
This Thesis is brought to you for free and open access by ScholarWorks. It has been accepted for inclusion in Theses, Dissertations, Professional Papers by an authorized administrator of ScholarWorks. For more information, please contact

STANFORD UNIVERSITY PRESS The State of State Reform in Latin America Edited by

by Eduardo Lora, Francis Fukuyama
"... bl ic Di sc lo su re A ut ho riz ed Pu bl ic Di sc lo su re A ut ho riz ed Pu bl ic Di sc lo su re A ut ho riz ed Pu bl ic Di sc lo su re A ut ho riz ed ..."
Abstract - Add to MetaCart
bl ic Di sc lo su re A ut ho riz ed Pu bl ic Di sc lo su re A ut ho riz ed Pu bl ic Di sc lo su re A ut ho riz ed Pu bl ic Di sc lo su re A ut ho riz ed

i TOWARDS A JUSTIFICATION FOR A PHILOSOPHY OF

by Music Education, Marguerite Barker Reinecke , 2007
"... ii ..."
Abstract - Add to MetaCart
Abstract not found
Next 10 →
Results 1 - 10 of 14
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University