Sciweavers

766 search results - page 27 / 154
» How to Read a Signature
Sort
View
FC
2007
Springer
158views Cryptology» more  FC 2007»
14 years 1 months ago
Hidden Identity-Based Signatures
This paper introduces Hidden Identity-based Signatures (Hidden-IBS), a type of digital signatures that provide mediated signer-anonymity on top of Shamir’s Identity-based signat...
Aggelos Kiayias, Hong-Sheng Zhou
ACL
2008
13 years 9 months ago
Regular Tree Grammars as a Formalism for Scope Underspecification
We propose the use of regular tree grammars (RTGs) as a formalism for the underspecified processing of scope ambiguities. By applying standard results on RTGs, we obtain a novel a...
Alexander Koller, Michaela Regneri, Stefan Thater
PROFES
2005
Springer
14 years 1 months ago
Investigating the Impact of Active Guidance on Design Inspection
Software inspection helps to improve the quality of software products early in the development process. For design inspection recent research showed that usage-based reading of doc...
Dietmar Winkler, Stefan Biffl, Bettina Thurnher
W4A
2006
ACM
14 years 1 months ago
How people use presentation to search for a link: expanding the understanding of accessibility on the web
It is well known that many Web pages are difficult for visually disabled people to use. Without access to a rich, visual display, the intended structure and organisation of the pa...
Caroline Jay, Robert Stevens, Mashhuda Glencross, ...
P2P
2008
IEEE
137views Communications» more  P2P 2008»
14 years 1 months ago
Hierarchical Codes: How to Make Erasure Codes Attractive for Peer-to-Peer Storage Systems
Redundancy is the basic technique to provide reliability in storage systems consisting of multiple components. A redundancy scheme defines how the redundant data are produced and...
Alessandro Duminuco, Ernst Biersack