Sciweavers

4839 search results - page 927 / 968
» Providing SCORM with adaptivity
Sort
View
ASIACRYPT
2003
Springer
14 years 19 days ago
Certificateless Public Key Cryptography
This paper introduces the concept of certificateless public key cryptography (CL-PKC). In contrast to traditional public key cryptographic systems, CL-PKC does not require the use...
Sattam S. Al-Riyami, Kenneth G. Paterson
ICDCS
2010
IEEE
14 years 18 days ago
Deployment of a Reinforcement Backbone Network with Constraints of Connection and Resources
In recent years, we have seen a surge of interest in enabling communications over meshed wireless networks. Particularly, supporting peer-to-peer communications over a multi-hop w...
Peng Wei, Shan Chu, Xin Wang, Yu Zhou
FAABS
2000
Springer
14 years 17 days ago
Design and Mathematical Analysis of Agent-Based Systems
Abstract. Agent-based systems that are composed of simple locally interacting agents but which demonstrate complex group behavior o er several advantages over traditional multi-age...
Kristina Lerman
RT
2000
Springer
14 years 16 days ago
Parameterized Animation Compression
Synthetic images can be parameterized by more than time or viewpoint. We generalize image-based rendering by exploiting texture-mapping graphics hardware to decompress ray-traced ...
Ziyad S. Hakura, Jerome Edward Lengyel, John M. Sn...
VLDB
2000
ACM
166views Database» more  VLDB 2000»
14 years 16 days ago
Oracle8i Index-Organized Table and Its Application to New Domains
Primary B+ -tree, a variant of B+ -tree structure with row data in leaf blocks, is an ideal storage organization for queries involving exact match and/or range search on primary k...
Jagannathan Srinivasan, Souripriya Das, Chuck Frei...