Sciweavers

308 search results - page 43 / 62
» User's Functions in Standard Prolog
Sort
View
PKC
2004
Springer
195views Cryptology» more  PKC 2004»
14 years 4 months ago
An RSA Family of Trap-Door Permutations with a Common Domain and Its Applications
Abstract. Bellare, Boldyreva, Desai, and Pointcheval [1] recently proposed a new security requirement of the encryption schemes called “keyprivacy.” It asks that the encryption...
Ryotaro Hayashi, Tatsuaki Okamoto, Keisuke Tanaka
GROUP
2003
ACM
14 years 4 months ago
Awareness support in a groupware widget toolkit
Group awareness is an important part of synchronous collaboration, and support for group awareness can greatly improve groupware usability. However, it is still difficult to build...
Jason Hill, Carl Gutwin
MM
2003
ACM
132views Multimedia» more  MM 2003»
14 years 4 months ago
A flexible and scalable authentication scheme for JPEG2000 image codestreams
JPEG2000 is an emerging standard for still image compression and is becoming the solution of choice for many digital imaging fields and applications. An important aspect of JPEG2...
Cheng Peng, Robert H. Deng, Yongdong Wu, Weizhong ...
ISCC
2002
IEEE
139views Communications» more  ISCC 2002»
14 years 3 months ago
BWIG: Bluetooth Web Internet Gateway
Bluetooth is a new wireless standard for low cost, low power, local radio communications. This technology is designed to be small enough to fit inside any electronic device, hence...
Nicolas Rouhana, Eric Horlait
PCI
2001
Springer
14 years 3 months ago
A Framework for Mobility and QoS Provisioning in IPv6 DECT Networks
The Internet Protocol suite is emerging as the ubiquitous communication platform for almost every conceivable information exchange. Hence, a worldwide effort to support IP functio...
Sarantis Paskalis, Georgios Lampropoulos, Dimitris...