Sciweavers

118 search results - page 10 / 24
» Transforming Out Timing Leaks
Sort
View
JDCTA
2010
169views more  JDCTA 2010»
13 years 3 months ago
The Partner Selection in Virtual Enterprise based on BDI Agent
This paper's research is based on the model of BDI Agent, carries out the research of the modeling and simulating the Virtual Enterprise's partner selection using Swarm ...
Wang Yu, Zhu Feng, Geng Hua, Zhuwang Jing
UIST
2000
ACM
14 years 28 days ago
Fluid sketches: continuous recognition and morphing of simple hand-drawn shapes
We describe a new sketching interface in which shape recognition and morphing are tightly coupled. Raw input strokes are continuously morphed into ideal geometric shapes, even bef...
James Arvo, Kevin Novins
CRYPTO
1994
Springer
98views Cryptology» more  CRYPTO 1994»
14 years 21 days ago
Proofs of Partial Knowledge and Simplified Design of Witness Hiding Protocols
Suppose we are given a proof of knowledge P in which a prover demonstrates that he knows a solution to a given problem instance. Suppose also that we have a secret sharing scheme S...
Ronald Cramer, Ivan Damgård, Berry Schoenmak...
BROADNETS
2004
IEEE
14 years 10 days ago
Diverse Routing for Shared Risk Resource Groups (SRRG) Failures in WDM Optical Networks
Failure resilience is one of the desired features of the Internet. Most of the traditional restoration architectures are based on single-failure assumption which is unrealistic. M...
Pallab Datta, Arun K. Somani
WWW
2003
ACM
14 years 9 months ago
A Presentation Architecture for Individualized Content
A modern approach for generating individualized web-sites is to compose a page out of individual elements, for instance XML-fragments, which is eventually transformed to . If the ...
Alberto González Palomo, Carsten Ullrich, P...