Sciweavers

725 search results - page 61 / 145
» A Generalization of Repetition Threshold
Sort
View
127
Voted
NDSS
2003
IEEE
15 years 8 months ago
Proxy Cryptography Revisited
In this work we revisit and formally study the notion of proxy cryptography. Intuitively, various proxy functions allow two cooperating parties F (the “FBI”) and P (the “pro...
Anca-Andreea Ivan, Yevgeniy Dodis
136
Voted
EUROCRYPT
1999
Springer
15 years 7 months ago
Secure Distributed Key Generation for Discrete-Log Based Cryptosystems
Distributed key generation is a main component of threshold cryptosystems and distributed cryptographic computing in general. Solutions to the distributed generation of private key...
Rosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk,...
3DIM
2001
IEEE
15 years 7 months ago
Comparison of HK and SC Curvature Description Methods
This paper compares two different local surface shape description methods. The general goal of surface shape description methods is to classify different surface shapes from range...
H. Cantzler, Robert B. Fisher
ASSETS
2008
ACM
15 years 5 months ago
Hover or tap?: supporting pen-based menu navigation for older adults
Tablet PCs are gaining popularity, but many users, particularly older ones, still struggle with pen-based interaction. One type of error, drifting, occurs when users accidentally ...
Karyn Moffatt, Sandra Yuen, Joanna McGrenere
140
Voted
IJCAI
2001
15 years 4 months ago
Balance and Filtering in Structured Satisfiable Problems
New methods to generate hard random problem instances have driven progress on algorithms for deduction and constraint satisfaction. Recently Achlioptas et al. (AAAI 2000) introduc...
Henry A. Kautz, Yongshao Ruan, Dimitris Achlioptas...