Sciweavers

774 search results - page 90 / 155
» Factors of generalized Fermat numbers
Sort
View
NSPW
2003
ACM
14 years 3 months ago
Public key distribution through "cryptoIDs"
In this paper, we argue that person-to-person key distribution is best accomplished with a key-centric approach, instead of PKI: users should distribute public key fingerprints in...
Trevor Perrin
VRST
2003
ACM
14 years 3 months ago
Information-rich virtual environments: theory, tools, and research agenda
Virtual environments (VEs) allow users to experience and interact with a rich sensory environment, but most virtual worlds contain only sensory information similar to that which w...
Doug A. Bowman, Chris North, Jian Chen, Nicholas F...
CRYPTO
2003
Springer
187views Cryptology» more  CRYPTO 2003»
14 years 3 months ago
On Constructing Locally Computable Extractors and Cryptosystems in the Bounded Storage Model
We consider the problem of constructing randomness extractors that are locally computable; that is, read only a small number of bits from their input. As recently shown by Lu (thi...
Salil P. Vadhan
ESA
2003
Springer
81views Algorithms» more  ESA 2003»
14 years 3 months ago
Optimal Dynamic Video-on-Demand Using Adaptive Broadcasting
We consider the transmission of a movie over a broadcast network to support several viewers who start watching at arbitrary times, after a wait of at most twait minutes. A recent a...
Therese C. Biedl, Erik D. Demaine, Alexander Golyn...
FPL
2003
Springer
95views Hardware» more  FPL 2003»
14 years 3 months ago
A Model for Hardware Realization of Kernel Loops
Abstract. Hardware realization of kernel loops holds the promise of accelerating the overall application performance and is therefore an important part of the synthesis process. In...
Jirong Liao, Weng-Fai Wong, Tulika Mitra