Sciweavers

11160 search results - page 2074 / 2232
» Incompleteness in a General Setting
Sort
View
CRYPTO
2001
Springer
202views Cryptology» more  CRYPTO 2001»
15 years 8 months ago
Revocation and Tracing Schemes for Stateless Receivers
We deal with the problem of a center sending a message to a group of users such that some subset of the users is considered revoked and should not be able to obtain the content of...
Dalit Naor, Moni Naor, Jeffery Lotspiech
EUROCRYPT
2001
Springer
15 years 8 months ago
Priced Oblivious Transfer: How to Sell Digital Goods
Abstract. We consider the question of protecting the privacy of customers buying digital goods. More specifically, our goal is to allow a buyer to purchase digital goods from a ve...
William Aiello, Yuval Ishai, Omer Reingold
EWSPT
2001
Springer
15 years 8 months ago
A Mobile Agent Approach to Process-Based Dynamic Adaptation of Complex Software Systems
We describe an approach based upon software process technology to on-the-fly monitoring, redeployment, reconfiguration, and in general dynamic adaptation of distributed software ap...
Giuseppe Valetto, Gail E. Kaiser, Gaurav S. Kc
SIGGRAPH
2010
ACM
15 years 8 months ago
envyLight: an interface for editing natural illumination
Scenes lit with high dynamic range environment maps of real-world environments exhibit all the complex nuances of natural illumination. For applications that need lighting adjustm...
Fabio Pellacini
130
Voted
ICS
2001
Tsinghua U.
15 years 8 months ago
Cache performance for multimedia applications
The caching behavior of multimedia applications has been described as having high instruction reference locality within small loops, very large working sets, and poor data cache p...
Nathan T. Slingerland, Alan Jay Smith
« Prev « First page 2074 / 2232 Last » Next »