Sciweavers

33 search results - page 4 / 7
» What Else Is There
Sort
View
ACSAC
2004
IEEE
13 years 10 months ago
Securing a Remote Terminal Application with a Mobile Trusted Device
Many real-world applications use credentials such as passwords as means of user authentication. When accessed from untrusted public terminals, such applications are vulnerable to ...
Alina Oprea, Dirk Balfanz, Glenn Durfee, Diana K. ...
UC
2005
Springer
14 years 11 days ago
Quantum Searching Amidst Uncertainty
Consider a database most of whose entries are marked but the precise fraction of marked entries is not known. What is known is that the fraction of marked entries is 1 − , where ...
Lov K. Grover
TIDSE
2004
Springer
14 years 7 days ago
A System to Compose Movies for Cross-Cultural Storytelling: Textable Movie
Abstract. This paper presents Textable Movie, an open-ended interface that allows anyone to become "video-jockey." In the framework of computational storytelling, Textabl...
Catherine Vaucelle, Glorianna Davenport
MSS
2010
IEEE
127views Hardware» more  MSS 2010»
13 years 5 months ago
Fair intergenerational sharing of a natural resource
Overlapping generations are extracting a natural resource over an infinite future. We examine fair allocation of resource and compensations among generations. Fairness is define...
Hippolyte d'Albis, Stefan Ambec
SYNTHESE
2011
96views more  SYNTHESE 2011»
13 years 1 months ago
Models and the locus of their truth
If models can be true, where is their truth located? Giere (e.g. 1988) has suggested an account of theoretical models on which models themselves are not truth-valued. The paper su...
Uskali Mäki