Sciweavers

842 search results - page 104 / 169
» About the authors
Sort
View
PKC
2000
Springer
120views Cryptology» more  PKC 2000»
13 years 11 months ago
Optimally Efficient Accountable Time-Stamping
Abstract. Efficient secure time-stamping schemes employ a 2-level approach in which the time-stamping service operates in rounds. We say that a time-stamping service is accountable...
Ahto Buldas, Helger Lipmaa, Berry Schoenmakers
UIST
1995
ACM
13 years 11 months ago
Multiple-View Approach for Smooth Information Retrieval
Although various visualization techniques have been proposed for information retrieval tasks, most of them are based on a single strategy for viewing and navigating through the in...
Toshiyuki Masui, Mitsuru Minakuchi, George R. Bord...
CHI
2010
ACM
13 years 11 months ago
Artificial subtle expressions: intuitive notification methodology of artifacts
We describe artificial subtle expressions (ASEs) as intuitive notification methodology for artifacts' internal states for users. We prepared two types of audio ASEs; one was ...
Takanori Komatsu, Seiji Yamada, Kazuki Kobayashi, ...
DLOG
2008
13 years 10 months ago
Identifying Objects Over Time with Description Logics
A fundamental requirement for cooperating agents is to agree on a selection of component values of objects that can be used for reliably communicating references to the objects, to...
David Toman, Grant E. Weddell
WSC
2007
13 years 10 months ago
Enabling smooth and scalable dynamic 3d visualization of discrete-event construction simulations in outdoor augmented reality
Visualization is a powerful method for verifying, validating, and communicating the results of a simulated model. Lack of visual understanding about a simulated model is one of th...
Amir H. Behzadan, Vineet R. Kamat