Sciweavers

1045 search results - page 144 / 209
» The Use of Exceptions
Sort
View
CSREASAM
2006
13 years 9 months ago
Mechanism-Based PKI - A Real-Time Key Generation from Fingerprints
- This paper proposes a "mechanism-based PKI", in which only a mechanism for generating user's private keys is installed on a smart card. The private key is generate...
Yoichi Shibata, Masahiro Mimura, Kenta Takahashi, ...
ECIS
2004
13 years 9 months ago
From asp to web services: identifying key performance areas and indicators for healthcare
Value creation from e-business for customers in healthcare is an important topic in academic and practitioner circles. This paper reports the findings from a two-year research stu...
Matthew W. Guah, Wendy L. Currie
EVOTING
2004
89views Hardware» more  EVOTING 2004»
13 years 9 months ago
E-Voting and the Architecture of Virtual Space
: One of the basic principles of architecture is that of the relation between function and form. It is a common fact that in most cases form reveals or refers to function. Thus by ...
Anthoula Maidou, Hariton M. Polatoglou
EUROIMSA
2006
116views Multimedia» more  EUROIMSA 2006»
13 years 9 months ago
Guidelines for Selecting Practical MPEG Group of Pictures
The repeated pattern of I, P and B frames in an MPEG stream is known as the Group of Pictures (GOP). Current GOP choices are made using intuition and informal guidelines without t...
Huahui Wu, Mark Claypool, Robert E. Kinicki
ICWN
2004
13 years 9 months ago
Demand-Driven Clustering in MANETs
Abstract-- Many clustering protocols for mobile ad hoc networks (MANETs) have been proposed in the literature. With only one exception so far [1], all these protocols are proactive...
Curt Cramer, Oliver Stanze, Kilian Weniger, Martin...