Sciweavers

1017 search results - page 144 / 204
» On the Power of k -Consistency
Sort
View
SAC
2004
ACM
14 years 3 months ago
A secure method for signature delegation to mobile agents
This paper presents a novel method that allows the delegation of signature power to one or more entities that jointly play the role of a proxy signer. This work is different from ...
Omaima Bamasak, Ning Zhang
SIGCSE
2004
ACM
99views Education» more  SIGCSE 2004»
14 years 3 months ago
Java IO and testing made simple
We present software tools that support robust input processing and comprehensive testing in Java. The software includes the JPT library that supports error-checked typed input via...
Viera K. Proulx, Richard Rasala
ECCV
2004
Springer
14 years 3 months ago
Cone-Beam Image Reconstruction by Moving Frames
In this paper, we present a new algorithmic paradigm for cone-beam image reconstruction. The new class of algorithms, referred to as cone-beam reconstruction by moving frames, enab...
Xiaochun Yang 0002, Berthold K. P. Horn
ECOOP
2004
Springer
14 years 3 months ago
Increasing Concurrency in Databases Using Program Analysis
Programmers have come to expect better integration between databases and the programming languages they use. While this trend continues unabated, database concurrency scheduling ha...
Roman Vitenberg, Kristian Kvilekval, Ambuj K. Sing...
EUROPKI
2004
Springer
14 years 3 months ago
Distributed CA-based PKI for Mobile Ad Hoc Networks Using Elliptic Curve Cryptography
The implementation of a standard PKI in a mobile ad hoc network (MANET) is not practical for several reasons: (1) lack of a fixed infrastructure; (2) a centralized certification au...
Charikleia Zouridaki, Brian L. Mark, Kris Gaj, Ros...