Sciweavers

725 search results - page 61 / 145
» A Generalization of Repetition Threshold
Sort
View
NDSS
2003
IEEE
14 years 2 months ago
Proxy Cryptography Revisited
In this work we revisit and formally study the notion of proxy cryptography. Intuitively, various proxy functions allow two cooperating parties F (the “FBI”) and P (the “pro...
Anca-Andreea Ivan, Yevgeniy Dodis
EUROCRYPT
1999
Springer
14 years 1 months ago
Secure Distributed Key Generation for Discrete-Log Based Cryptosystems
Distributed key generation is a main component of threshold cryptosystems and distributed cryptographic computing in general. Solutions to the distributed generation of private key...
Rosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk,...
3DIM
2001
IEEE
14 years 18 days ago
Comparison of HK and SC Curvature Description Methods
This paper compares two different local surface shape description methods. The general goal of surface shape description methods is to classify different surface shapes from range...
H. Cantzler, Robert B. Fisher
ASSETS
2008
ACM
13 years 11 months ago
Hover or tap?: supporting pen-based menu navigation for older adults
Tablet PCs are gaining popularity, but many users, particularly older ones, still struggle with pen-based interaction. One type of error, drifting, occurs when users accidentally ...
Karyn Moffatt, Sandra Yuen, Joanna McGrenere
IJCAI
2001
13 years 10 months ago
Balance and Filtering in Structured Satisfiable Problems
New methods to generate hard random problem instances have driven progress on algorithms for deduction and constraint satisfaction. Recently Achlioptas et al. (AAAI 2000) introduc...
Henry A. Kautz, Yongshao Ruan, Dimitris Achlioptas...