Sciweavers

532 search results - page 64 / 107
» Extending Scalar Multiplication Using Double Bases
Sort
View
IPPS
1998
IEEE
14 years 28 days ago
Prioritized Token-Based Mutual Exclusion for Distributed Systems
A number of solutions have been proposed for the problem of mutual exclusion in distributed systems. Some of these approaches have since been extended to a prioritized environment...
Frank Mueller
ER
2009
Springer
137views Database» more  ER 2009»
14 years 1 months ago
Multi-level Conceptual Modeling and OWL
Ontological metamodeling or multilevel-modeling refers to ng complex domains at multiple levels of abstraction, especially in domains where the borderline between individuals and c...
Bernd Neumayr, Michael Schrefl
VR
2000
IEEE
127views Virtual Reality» more  VR 2000»
14 years 1 months ago
Physically-based Manipulation on the Responsive Workbench
This paper describes how a physical simulation can be integrated with our Responsive Workbench system to support complex assembly tasks involving multiple hands and users. Our sys...
Bernd Fröhlich, Henrik Tramberend, Andrew C. ...
FLAIRS
2008
13 years 11 months ago
Complementary Analysis of High-Order Association Patterns and Classification
To facilitate more meaningful interpretation considering the internal interdependency relationships between data values, a new form of high-order (multiple-valued) pattern known a...
Thomas W. H. Lui, David K. Y. Chiu
ASIACRYPT
2010
Springer
13 years 6 months ago
Leakage Resilient ElGamal Encryption
Blinding is a popular and well-known countermeasure to protect public-key cryptosystems against side-channel attacks. The high level idea is to randomize an exponentiation in order...
Eike Kiltz, Krzysztof Pietrzak