Sciweavers

340 search results - page 62 / 68
» A Simple User Authentication Scheme for Grid Computing
Sort
View
NDSS
2003
IEEE
14 years 29 days ago
Proxy Cryptography Revisited
In this work we revisit and formally study the notion of proxy cryptography. Intuitively, various proxy functions allow two cooperating parties F (the “FBI”) and P (the “pro...
Anca-Andreea Ivan, Yevgeniy Dodis
SIGGRAPH
1997
ACM
13 years 12 months ago
Interactive Boolean operations for conceptual design of 3-D solids
Interactive modeling of 3-D solids is an important and difficult problem in computer graphics. The Constructive Solid Geometry (CSG) modeling scheme is highly attractive for inte...
Ari Rappoport, Steven N. Spitz
PPOPP
2012
ACM
12 years 3 months ago
Chestnut: a GPU programming language for non-experts
Graphics processing units (GPUs) are powerful devices capable of rapid parallel computation. GPU programming, however, can be quite difficult, limiting its use to experienced prog...
Andrew Stromme, Ryan Carlson, Tia Newhall
SIGGRAPH
1992
ACM
13 years 11 months ago
Variational surface modeling
We present a new approachto interactive modeling of freeform surfaces. Instead of a fixed mesh of control points, the model presented to the user is that of an infinitely malleabl...
William Welch, Andrew P. Witkin
WINE
2005
Springer
109views Economy» more  WINE 2005»
14 years 1 months ago
New Algorithms for Mining the Reputation of Participants of Online Auctions
The assessment of credibility and reputation of contractors in online auctions is the key issue in providing reliable environment for customer-to-customer e-commerce. Confident re...
Mikolaj Morzy