Sciweavers

7112 search results - page 1375 / 1423
» Power in normative systems
Sort
View
EUROCRYPT
2004
Springer
14 years 1 months ago
The Hierarchy of Key Evolving Signatures and a Characterization of Proxy Signatures
For the last two decades the notion and implementations of proxy signatures have been used to allow transfer of digital signing power within some context (in order to enable flexi...
Tal Malkin, Satoshi Obana, Moti Yung
ICMI
2004
Springer
129views Biometrics» more  ICMI 2004»
14 years 1 months ago
Multimodal transformed social interaction
Understanding human-human interaction is fundamental to the long-term pursuit of powerful and natural multimodal interfaces. Nonverbal communication, including body posture, gestu...
Matthew Turk, Jeremy N. Bailenson, Andrew C. Beall...
ICS
2004
Tsinghua U.
14 years 1 months ago
Energy conservation techniques for disk array-based servers
In this paper, we study energy conservation techniques for disk array-based network servers. First, we introduce a new conservation technique, called Popular Data Concentration (P...
Eduardo Pinheiro, Ricardo Bianchini
NIME
2004
Springer
108views Music» more  NIME 2004»
14 years 1 months ago
"On-the-fly Programming: Using Code as an Expressive Musical Instrument"
On-the-fly programming is a style of programming in which the programmer/performer/composer augments and modifies the program while it is running, without stopping or restarting, ...
Ge Wang, Perry R. Cook
SAS
2004
Springer
14 years 1 months ago
On Logics of Aliasing
Abstract. In this paper we investigate the existence of a deductive veri cation method based on a logic that describes pointer aliasing. The main idea of such a method is that the ...
Marius Bozga, Radu Iosif, Yassine Lakhnech
« Prev « First page 1375 / 1423 Last » Next »