Sciweavers

1358 search results - page 18 / 272
» Proceedings
Sort
View
HUC
2009
Springer
13 years 12 months ago
Authenticating ubiquitous services: a study of wireless hotspot access
: © Authenticating Ubiquitous Services: A Study of Wireless Hotspot Access Tim Kindberg, Chris Bevan, Eamonn O'Neill, James Mitchell, Jim Grimmett, Dawn Woodgate HP Laborator...
Tim Kindberg, Chris Bevan, Eamonn O'Neill, James M...
COCO
1998
Springer
123views Algorithms» more  COCO 1998»
13 years 11 months ago
Isolation, Matching, and Counting
We show that the perfect matching problem is in the complexity class SPL in the nonuniform setting. This provides a better upper bound on the complexity of the matching problem, a...
Eric Allender, Klaus Reinhardt
CRYPTO
1998
Springer
117views Cryptology» more  CRYPTO 1998»
13 years 11 months ago
Relations Among Notions of Security for Public-Key Encryption Schemes
ded abstract of this paper appears in Advances in Cryptology { Crypto 98 Proceedings, Lecture Notes in Computer Science Vol. 1462, H. Krawczyk ed., Springer-Verlag, 1998. This is t...
Mihir Bellare, Anand Desai, David Pointcheval, Phi...
ACM
1995
13 years 11 months ago
Characteristics of Modern System Implementation Languages
: Systems are written in systems implementation languages. What characterizes such languages in the mid-1990’s? This paper identifies the typical environment that a system is bei...
Judy M. Bishop, R. Faria
SIGGRAPH
2000
ACM
13 years 11 months ago
Pose space deformation: a unified approach to shape interpolation and skeleton-driven deformation
Pose space deformation generalizes and improves upon both shape interpolation and common skeleton-driven deformation techniques. This deformation approach proceeds from the observ...
John P. Lewis, Matt Cordner, Nickson Fong