Sciweavers

2537 search results - page 44 / 508
» How to draw a group
Sort
View
CTRSA
2006
Springer
157views Cryptology» more  CTRSA 2006»
15 years 8 months ago
How to Construct Multicast Cryptosystems Provably Secure Against Adaptive Chosen Ciphertext Attack
Abstract. In this paper we present a general framework for constructing efficient multicast cryptosystems with provable security and show that a line of previous work on multicast ...
Yitao Duan, John F. Canny
CSCW
2008
ACM
15 years 6 months ago
The computational geowiki: what, why, and how
Google Maps and its spin-offs are highly successful, but they have a major limitation: users see only pictures of geographic data. These data are inaccessible except by limited ve...
Reid Priedhorsky, Loren G. Terveen
BCSHCI
2007
15 years 5 months ago
How effective is it to design by voice?
Previous studies on usability of crowded graphical interfaces that are full of widgets like menus, buttons, palette-tools etc, have shown evidence that they create a fertile envir...
Mohammad M. Alsuraihi, Dimitris I. Rigas
LREC
2010
185views Education» more  LREC 2010»
15 years 5 months ago
How Certain are Clinical Assessments? Annotating Swedish Clinical Text for (Un)certainties, Speculations and Negations
Clinical texts contain a large amount of information. Some of this information is embedded in contexts where e.g. a patient status is reasoned about, which may lead to a considera...
Hercules Dalianis, Sumithra Velupillai
ACTA
2000
92views more  ACTA 2000»
15 years 4 months ago
How to Calculate Symmetries of Petri Nets
Symmetric net structure yields symmetric net behaviour. Thus, knowing the symmetries of a net, redundant calculations can be skipped. We present a framework for the calculation of ...
Karsten Schmidt 0004