Sciweavers

102 search results - page 8 / 21
» Beyond threaded conversation
Sort
View
FSE
2006
Springer
132views Cryptology» more  FSE 2006»
13 years 11 months ago
New Blockcipher Modes of Operation with Beyond the Birthday Bound Security
In this paper, we define and analyze a new blockcipher mode of operation for encryption, CENC, which stands for Cipher-based ENCryption. CENC has the following advantages: (1) bey...
Tetsu Iwata
CHI
2006
ACM
14 years 7 months ago
Insert movie reference here: a system to bridge conversation and item-oriented web sites
Item-oriented Web sites maintain repositories of information about things such as books, games, or products. Many of these Web sites offer discussion forums. However, these forums...
Sara Drenner, F. Maxwell Harper, Dan Frankowski, J...
FOSSACS
2005
Springer
14 years 1 months ago
Expressivity of Coalgebraic Modal Logic: The Limits and Beyond
Modal logic has a good claim to being the logic of choice for describing the reactive behaviour of systems modeled as coalgebras. Logics with modal operators obtained from so-calle...
Lutz Schröder
IMAGING
2000
13 years 8 months ago
Illuminant Estimation: Beyond the Bases
We describe spectral estimation principles that are useful for color balancing, color conversion, and sensor design. The principles extend conventional estimation methods, which r...
Jeffrey M. DiCarlo, Brian A. Wandell
WEBNET
1997
13 years 8 months ago
Beyond Java: An Infrastructure for High-Performance Mobile Code on the World Wide Web
: We are building an infrastructure for the platform-independent distribution and execution of high-performance mobile code as a future Internet technology to complement and perhap...
Michael Franz