Sciweavers

2061 search results - page 226 / 413
» Authorization for Metacomputing Applications
Sort
View
CISC
2008
Springer
152views Cryptology» more  CISC 2008»
15 years 6 months ago
Privacy for Private Key in Signatures
One of the important applications of digital signature is anonymous credential or pseudonym system. In these scenarios, it is essential that the identity of the signer is kept secr...
Qianhong Wu, Bo Qin, Yi Mu, Willy Susilo
148
Voted
HCI
2007
15 years 6 months ago
Design Tools for User Experience Design
: The purpose of this research was to develop an approach to artifact design based on information technology. To make interactive systems easy to use, many companies utilize a user...
Kazuhiko Yamazaki, Kazuo Furuta
PRIS
2004
15 years 6 months ago
Learning Text Extraction Rules, without Ignoring Stop Words
Information Extraction (IE) from text /web documents has become an important application area of AI. As the number of web sites and documents has grown dramatically, the users need...
João Cordeiro, Pavel Brazdil
IWFM
2003
15 years 6 months ago
Using Admissible Interference to Detect Denial of Service Vulnerabilities
Meadows recently proposed a formal cost-based framework for analysis of denial of service. It was showed how some principles that have already been used to make cryptographic prot...
Stéphane Lafrance, John Mullins
GRAPHICSINTERFACE
1997
15 years 6 months ago
A Heuristic Method for Generating 2D CSG Trees from Bitmaps
This paper presents a method for generating compact and effective constructive-solid-geometry (CSG) object representations from 2D bitmap representations. The method consists of t...
Sarah F. Frisken Gibson, Joe Marks, Danielle Feinb...