Sciweavers

1557 search results - page 55 / 312
» What can we do with a Solution
Sort
View
HICSS
2002
IEEE
90views Biometrics» more  HICSS 2002»
14 years 19 days ago
Legitimate by Design: Towards Trusted Virtual Community Environments
Legitimacy is a key part of the social requirements specification for a trusted virtual community environment (VCE). If an environment is not seen as legitimate, social conflicts m...
Brian Whitworth, Aldo de Moor
RC
2002
70views more  RC 2002»
13 years 7 months ago
On Existence and Uniqueness Verification for Non-Smooth Functions
Given an approximate solution to a nonlinear system of equations at which the Jacobi matrix is nonsingular, and given that the Jacobi matrix is continuous in a region about this ap...
R. Baker Kearfott
PAIRING
2010
Springer
149views Cryptology» more  PAIRING 2010»
13 years 5 months ago
Constructing Certificateless Encryption and ID-Based Encryption from ID-Based Key Agreement
Abstract. We discuss the relationship between ID-based key agreement protocols, certificateless encryption and ID-based key encapsulation mechanisms. In particular we show how in s...
Dario Fiore, Rosario Gennaro, Nigel P. Smart
FOCS
2008
IEEE
13 years 8 months ago
Set Covering with our Eyes Closed
Given a universe U of n elements and a weighted collection S of m subsets of U, the universal set cover problem is to a-priori map each element u ∈ U to a set S(u) ∈ S contain...
Fabrizio Grandoni, Anupam Gupta, Stefano Leonardi,...
HCI
2007
13 years 9 months ago
Integrating Innovative Neuro-educational Technologies (I-Net) into K-12 Science Classrooms
With the U.S. facing a decline in science, math and engineering skills, there is a need for educators in these fields to team with engineers and cognitive scientists to pioneer nov...
Ronald H. Stevens, Trysha Galloway, Chris Berka