Sciweavers

2537 search results - page 44 / 508
» How to draw a group
Sort
View
CTRSA
2006
Springer
157views Cryptology» more  CTRSA 2006»
14 years 10 days ago
How to Construct Multicast Cryptosystems Provably Secure Against Adaptive Chosen Ciphertext Attack
Abstract. In this paper we present a general framework for constructing efficient multicast cryptosystems with provable security and show that a line of previous work on multicast ...
Yitao Duan, John F. Canny
CSCW
2008
ACM
13 years 10 months ago
The computational geowiki: what, why, and how
Google Maps and its spin-offs are highly successful, but they have a major limitation: users see only pictures of geographic data. These data are inaccessible except by limited ve...
Reid Priedhorsky, Loren G. Terveen
BCSHCI
2007
13 years 10 months ago
How effective is it to design by voice?
Previous studies on usability of crowded graphical interfaces that are full of widgets like menus, buttons, palette-tools etc, have shown evidence that they create a fertile envir...
Mohammad M. Alsuraihi, Dimitris I. Rigas
LREC
2010
185views Education» more  LREC 2010»
13 years 10 months ago
How Certain are Clinical Assessments? Annotating Swedish Clinical Text for (Un)certainties, Speculations and Negations
Clinical texts contain a large amount of information. Some of this information is embedded in contexts where e.g. a patient status is reasoned about, which may lead to a considera...
Hercules Dalianis, Sumithra Velupillai
ACTA
2000
92views more  ACTA 2000»
13 years 8 months ago
How to Calculate Symmetries of Petri Nets
Symmetric net structure yields symmetric net behaviour. Thus, knowing the symmetries of a net, redundant calculations can be skipped. We present a framework for the calculation of ...
Karsten Schmidt 0004