Sciweavers

13224 search results - page 2524 / 2645
» Self-monitoring for Computer Users
Sort
View
PODC
2003
ACM
14 years 1 months ago
Scalable public-key tracing and revoking
Traitor Tracing Schemes constitute a very useful tool against piracy in the context of digital content broadcast. In such multi-recipient encryption schemes, each decryption key is...
Yevgeniy Dodis, Nelly Fazio, Aggelos Kiayias, Moti...
PPOPP
2003
ACM
14 years 1 months ago
Using generative design patterns to generate parallel code for a distributed memory environment
A design pattern is a mechanism for encapsulating the knowledge of experienced designers into a re-usable artifact. Parallel design patterns reflect commonly occurring parallel co...
Kai Tan, Duane Szafron, Jonathan Schaeffer, John A...
SAC
2003
ACM
14 years 1 months ago
Design Time Support for Adaptive Behavior in Web Sites
Adaptive web sites are sites that automatically improve their internal organization and/or presentation by observing userbrowsing behavior. In this paper we argue that adaptive be...
Sven Casteleyn, Olga De Troyer, Saar Brockmans
SACMAT
2003
ACM
14 years 1 months ago
Cooperative role-based administration
In large organizations the administration of access privileges (such as the assignment of an access right to a user in a particular role) is handled cooperatively through distribu...
Horst Wedde, Mario Lischka
SI3D
2003
ACM
14 years 1 months ago
An automatic modeling of human bodies from sizing parameters
In this paper, we present an automatic, runtime modeler for modeling realistic, animatable human bodies. A user can generate a new model or modify an existing one simply by inputt...
Hyewon Seo, Nadia Magnenat-Thalmann
« Prev « First page 2524 / 2645 Last » Next »