Sciweavers

488 search results - page 34 / 98
» REDUCE Meets CAMAL
Sort
View
PKC
2009
Springer
131views Cryptology» more  PKC 2009»
14 years 10 months ago
Towards Black-Box Accountable Authority IBE with Short Ciphertexts and Private Keys
At Crypto'07, Goyal introduced the concept of Accountable Authority Identity-Based Encryption as a convenient tool to reduce the amount of trust in authorities in Identity-Bas...
Benoît Libert, Damien Vergnaud
CHI
2006
ACM
14 years 10 months ago
Co-authoring with structured annotations
Most co-authoring tools support basic annotations, such as edits and comments that are anchored at specific locations in the document. However, they do not support metacommentary ...
Qixing Zheng, Kellogg S. Booth, Joanna McGrenere
VLSID
2002
IEEE
172views VLSI» more  VLSID 2002»
14 years 10 months ago
Improvement of ASIC Design Processes
With device counts on modern-day ASICs crossing the 10 million mark, careful planning of an ASIC design project is necessary to meet time deadlines. Two problems arise in this con...
Vineet Sahula, C. P. Ravikumar, D. Nagchoudhuri
MOBISYS
2003
ACM
14 years 9 months ago
Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking
Advances in sensing and tracking technology enable location-based applications but they also create significant privacy risks. Anonymity can provide a high degree of privacy, save...
Marco Gruteser, Dirk Grunwald
ICCAD
2006
IEEE
150views Hardware» more  ICCAD 2006»
14 years 6 months ago
Conjoining soft-core FPGA processors
Soft-core programmable processors on field-programmable gate arrays (FPGAs) can be custom synthesized to instantiate only those hardware units, such as multipliers and floating-po...
David Sheldon, Rakesh Kumar, Frank Vahid, Dean M. ...