Sciweavers

3095 search results - page 604 / 619
» Ubiquitous presence systems
Sort
View
CRYPTO
2000
Springer
136views Cryptology» more  CRYPTO 2000»
14 years 28 days ago
Long-Lived Broadcast Encryption
In a broadcast encryption scheme, digital content is encrypted to ensure that only privileged users can recover the content from the encrypted broadcast. Key material is usually he...
Juan A. Garay, Jessica Staddon, Avishai Wool
EUROCRYPT
1999
Springer
14 years 26 days ago
On the Performance of Hyperelliptic Cryptosystems
In this paper we discuss various aspects of cryptosystems based on hyperelliptic curves. In particular we cover the implementation of the group law on such curves and how to genera...
Nigel P. Smart
AGENTS
1998
Springer
14 years 25 days ago
A Hybrid Procedural/Deductive Executive for Autonomous Spacecraft
The New Millennium Remote Agent NMRA will be the rst AI system to control an actual spacecraft. The spacecraft domain places a strong premium on autonomy and requires dynamic reco...
Barney Pell, Edward B. Gamble, Erann Gat, Ron Kees...
VECPAR
1998
Springer
14 years 24 days ago
Simulating Magnetised Plasma with the Versatile Advection Code
Abstract. Matter in the universe mainly consists of plasma. The dynamics of plasmas is controlled by magnetic fields. To simulate the evolution of magnetised plasma, we solve the e...
Rony Keppens, Gábor Tóth
VISUALIZATION
1997
IEEE
14 years 24 days ago
Volume rendering of abdominal aortic aneurysms
Volume rendering is a valuable and important technique for scientific visualization. One well known application area is the reconstruction and visualization of output from medica...
Roger C. Tam, Christopher G. Healey, Borys Flak, P...