Sciweavers

2061 search results - page 267 / 413
» Authorization for Metacomputing Applications
Sort
View
ASIACRYPT
2009
Springer
15 years 11 months ago
Group Encryption: Non-interactive Realization in the Standard Model
Group encryption (GE) schemes, introduced at Asiacrypt’07, are an encryption analogue of group signatures with a number of interesting applications. They allow a sender to encryp...
Julien Cathalo, Benoît Libert, Moti Yung
ATAL
2009
Springer
15 years 11 months ago
Effects of resource and remembering on social networks
To better represent human interactions in social networks, the authors take a network-oriented simulation approach to analyze the evolution of acquaintance networks based on local...
Chung-Yuan Huang, Yu-Shiuan Tsai, Chuen-Tsai Sun
AUTOMOTIVEUI
2009
ACM
15 years 11 months ago
Developing a low-cost driving simulator for the evaluation of in-vehicle technologies
We present a case study concerning the development of a driving simulator at Mitsubishi Electric Research Laboratories. By relying largely on off-the-shelf components, we have kep...
Garrett Weinberg, Bret Harsham
DOCENG
2009
ACM
15 years 11 months ago
Declarative interfaces for dynamic widgets communications
Widgets are small and focused multimedia applications that can be found on desktop computers, mobile devices or even TV sets. Widgets rely on structured documents to describe thei...
Cyril Concolato, Jean Le Feuvre, Jean-Claude Dufou...
HT
2009
ACM
15 years 11 months ago
The 2LIP model and its implementations
In this article we present a model for 2-Layer Interface Paradigm (2LIP). 2LIP is an approach for designing simple yet interactive 3D web applications, an attempt to marry advanta...
Jacek Jankowski, Stefan Decker