Sciweavers

1012 search results - page 83 / 203
» What Robots Can Do
Sort
View
PAIRING
2010
Springer
149views Cryptology» more  PAIRING 2010»
15 years 2 months ago
Constructing Certificateless Encryption and ID-Based Encryption from ID-Based Key Agreement
Abstract. We discuss the relationship between ID-based key agreement protocols, certificateless encryption and ID-based key encapsulation mechanisms. In particular we show how in s...
Dario Fiore, Rosario Gennaro, Nigel P. Smart
125
Voted
CSREASAM
2006
15 years 6 months ago
Using Synthetic Decoys to Digitally Watermark Personally-Identifying Data and to Promote Data Security
Identity theft continues to be an ever-present problem. Identity theft and other related crimes are becoming an unparalleled phenomenon that nearly everyone will have to deal with...
Jonathan White, Dale Thompson
IUI
2005
ACM
15 years 10 months ago
Metafor: visualizing stories as code
Every program tells a story. Programming, then, is the art of constructing a story about the objects in the program and what they do in various situations. So-called programming l...
Hugo Liu, Henry Lieberman
130
Voted
CACM
1998
81views more  CACM 1998»
15 years 4 months ago
Toward a Model of Type Inheritance
rigorous, and abstract— clearly defined and generally agreed—type inheritance model. To quote an article by Taivalsaari: “The basic idea of inheritance is quite simple ... [a...
C. J. Date, Hugh Darwen
133
Voted
CORR
2006
Springer
114views Education» more  CORR 2006»
15 years 4 months ago
Emergence Explained
Abstract. Emergence--macro-level effects from micro-level causes--is at the heart of the conflict between reductionism and functionalism. How can there be autonomous higher level l...
Russ Abbott