Sciweavers

3346 search results - page 569 / 670
» A Generic Rendering System
Sort
View
EUROCRYPT
1998
Springer
14 years 1 months ago
Strengthened Security for Blind Signatures
Abstract. Provable security is a very nice property for cryptographic protocols. Unfortunately, in many cases, this is at the cost of a considerable loss in terms of efficiency. Mo...
David Pointcheval
VW
1998
Springer
157views Virtual Reality» more  VW 1998»
14 years 1 months ago
Real Face Communication in a Virtual World
This paper describes an efficient method to make an individual face for animation from several possible inputs and how to use this result for a realistic talking head communication...
Won-Sook Lee, Elwin Lee, Nadia Magnenat-Thalmann
COMPSAC
1996
IEEE
14 years 1 months ago
Business Rule Extraction from Legacy Code
Business rules are operational rules that business organizationsfollow to peq%rm various activities. Over time, business rules evolve and the software that implemented them are al...
Hai Huang, Wei-Tek Tsai, Sourav Bhattacharya, Xiao...
FSE
1997
Springer
280views Cryptology» more  FSE 1997»
14 years 1 months ago
New Block Encryption Algorithm MISTY
We propose secret-key cryptosystems MISTY1 and MISTY2, which are block ciphers with a 128-bit key, a 64-bit block and a variable number of rounds. MISTY is a generic name for MISTY...
Mitsuru Matsui
TIME
1994
IEEE
14 years 1 months ago
On the Representation of Temporal Object Roles in Object Oriented Databases
This paper outlines a generic, core temporal object model that provides support for the modeling of temporal object roles. This model draws from notions introduced in some of our ...
Niki Pissinou, Kia Makki