Sciweavers

759 search results - page 21 / 152
» What Can Be Implemented Anonymously
Sort
View
PVM
2005
Springer
14 years 3 months ago
An Evaluation of Implementation Options for MPI One-Sided Communication
MPI defines one-sided communication operations—put, get, and accumulate—together with three different synchronization mechanisms that define the semantics associated with th...
William D. Gropp, Rajeev Thakur
SFP
2003
13 years 11 months ago
Implementing Mobile Haskell
Abstract: Mobile computation enables computations to move between a dynamic set of locations, and is becoming an increasingly important paradigm. mHaskell is an extension of Haskel...
André Rauber Du Bois, Philip W. Trinder, Ha...
FC
2007
Springer
158views Cryptology» more  FC 2007»
14 years 4 months ago
Hidden Identity-Based Signatures
This paper introduces Hidden Identity-based Signatures (Hidden-IBS), a type of digital signatures that provide mediated signer-anonymity on top of Shamir’s Identity-based signat...
Aggelos Kiayias, Hong-Sheng Zhou
CHI
2008
ACM
14 years 10 months ago
Implementing eye-based user-aware e-learning
We propose an e-learning scenario where eye tracking is exploited to get valuable data about user behavior. What we look at -- as well as how we do that -- can in fact be used to ...
Marco Porta
UIST
1999
ACM
14 years 2 months ago
Implementing Phicons: Combining Computer Vision with InfraRed Technology for Interactive Physical Icons
This paper describes a novel physical icon [3] or “phicon-” based system that can be programmed to issue a range of commands about what the user wishes to do with handdrawn wh...
Darnell J. Moore, Roy Want, Beverly L. Harrison, A...