Sciweavers

18493 search results - page 3501 / 3699
» Timers for Distributed Systems
Sort
View
CRYPTO
1993
Springer
137views Cryptology» more  CRYPTO 1993»
14 years 8 days ago
Broadcast Encryption
A broadcast encryption scheme allows the sender to securely distribute data to a dynamically changing set of users over an insecure channel. One of the most challenging settings fo...
Amos Fiat, Moni Naor
IGIS
1994
118views GIS» more  IGIS 1994»
14 years 8 days ago
Surface Modelling with Guaranteed Consistency - An Object-Based Approach
There have been many interpolation methods developed over the years, each with their own problems. One of the biggest limitations in many applications is the non-correspondence of...
Christopher M. Gold, Thomas Roos
MM
1993
ACM
107views Multimedia» more  MM 1993»
14 years 8 days ago
What Video Can and Can't Do for Collaboration: A Case Study
As multimedia becomes an integral part of collaborative systems, we must understand how to design such systems to support users’ rich set of existing interaction skills, rather ...
Ellen Isaacs, John C. Tang
ASPLOS
1989
ACM
14 years 7 days ago
Architecture and Compiler Tradeoffs for a Long Instruction Word Microprocessor
A very long instruction word (VLIW) processorexploits parallelism by controlling multiple operations in a single instruction word. This paper describes the architecture and compil...
Robert Cohn, Thomas R. Gross, Monica S. Lam, P. S....
BTW
2007
Springer
236views Database» more  BTW 2007»
14 years 5 days ago
A Classification of Schema Mappings and Analysis of Mapping Tools
: Schema mapping techniques for data exchange have become popular and useful tools both in research and industry. A schema mapping relates a source schema with a target schema via ...
Frank Legler, Felix Naumann
« Prev « First page 3501 / 3699 Last » Next »