Sciweavers

3305 search results - page 212 / 661
» Can we Rely on SQL
Sort
View
ACISP
2007
Springer
14 years 5 months ago
TCHo: A Hardware-Oriented Trapdoor Cipher
This paper improves the Finiasz-Vaudenay construction of TCHo, a hardware-oriented public-key cryptosystem, whose security relies on the hardness of finding a low-weight multiple ...
Jean-Philippe Aumasson, Matthieu Finiasz, Willi Me...
AIED
2007
Springer
14 years 5 months ago
Investigating Generative Factors of Score Matrices
An implicit assumption in psychometrics and educational statistics is that the generative model for student scores on test questions is governed by the topics of those questions an...
Titus Winters, Christian R. Shelton, Tom Payne
SG
2007
Springer
14 years 4 months ago
Multi-view Sketch-Based FreeForm Modeling
For the generation of freeform 3D models, one of the most intuitive solution is to use sketch-based modeling environments. Unfortunately, since the user interface relies upon the a...
Florian Levet, Xavier Granier, Christophe Schlick
AUIC
2006
IEEE
14 years 4 months ago
A case for iconic icons
User interface designers still have to rely on personal creativity and skill when designing computer icons for program functions that have no existing conventional representation....
Jennifer Ferreira, James Noble, Robert Biddle
DEXAW
2006
IEEE
188views Database» more  DEXAW 2006»
14 years 4 months ago
A Protocol for Secure Content Distribution in Pure P2P Networks
A significant challenge for Peer-to-Peer (P2P) systems is maintaining the correctness and consistency of their global data structures and shared contents as peers independently a...
Esther Palomar, Juan M. Estévez-Tapiador, J...