Sciweavers

1988 search results - page 365 / 398
» Securing Information Transfer in Distributed Computing Envir...
Sort
View
SI3D
1997
ACM
14 years 1 months ago
Two-Handed Direct Manipulation on the Responsive Workbench
We have built a system that allows users to naturally manipulate virtual 3D models with both hands on the Responsive Workbench, a tabletop VR device. Our design is largely based u...
Lawrence D. Cutler, Bernd Fröhlich, Pat Hanra...
EUROCRYPT
1990
Springer
14 years 26 days ago
Experimental Quantum Cryptography
We describe results from an apparatus and protocol designed to implement quantum key distribution, by which two users, who share no secret information initially: 1) exchange a ran...
Charles H. Bennett, François Bessette, Gill...
MATA
2000
Springer
137views Communications» more  MATA 2000»
14 years 11 days ago
Topology Discovery in Ad Hoc Wireless Networks Using Mobile Agents
Extensive research on mobile agents has been rife with the growing interests in network computing. In this paper, we have discussed a mobile multi-agent-based framework to address ...
Romit Roy Choudhury, Somprakash Bandyopadhyay, Kri...
OOPSLA
2007
Springer
14 years 2 months ago
Notation and representation in collaborative object-oriented design: an observational study
Software designers in the object-oriented paradigm can make use of modeling tools and standard notations such as UML. Nevertheless, casual observations from collocated design coll...
Uri Dekel, James D. Herbsleb
MOBICOM
2010
ACM
13 years 9 months ago
Design and experimental evaluation of multi-user beamforming in wireless LANs
Multi-User MIMO promises to increase the spectral efficiency of next generation wireless systems and is currently being incorporated in future industry standards. Although a signi...
Ehsan Aryafar, Narendra Anand, Theodoros Salonidis...