Sciweavers

1698 search results - page 314 / 340
» Who Students Interact With
Sort
View
FOCS
2007
IEEE
14 years 4 months ago
Intrusion-Resilient Secret Sharing
We introduce a new primitive called Intrusion-Resilient Secret Sharing (IRSS), whose security proof exploits the fact that there exist functions which can be efficiently computed ...
Stefan Dziembowski, Krzysztof Pietrzak
SEMWEB
2007
Springer
14 years 4 months ago
Media Watch on Climate Change: Building and Visualizing Contextualized Information Spaces
Abstract. This paper presents the ’Media Watch on Climate Change’, an interactive Web portal that combines a portfolio of semantic services with a visual interface based on tig...
Arno Scharl, Albert Weichselbraun, Alexander Hubma...
ICRA
2005
IEEE
138views Robotics» more  ICRA 2005»
14 years 3 months ago
The Role of Motion Information in Learning Human-Robot Joint Attention
— To realize natural human-robot interactions and investigate the developmental mechanism of human communication, an effective approach is to construct models by which a robot im...
Yukie Nagai
JCDL
2004
ACM
181views Education» more  JCDL 2004»
14 years 3 months ago
The 3D vase museum: a new approach to context in a digital library
We present a new approach to displaying and browsing a digital library collection, a set of Greek vases in the Perseus digital library. Our design takes advantage of three-dimensi...
Horn-yeu Shiaw, Robert J. K. Jacob, Gregory R. Cra...
COMPSAC
2003
IEEE
14 years 3 months ago
Just What Could Possibly Go Wrong In B2B Integration?
One important trend in enterprise-scale IT has been the increasing use of business-to-business integration (B2Bi) technologies to automate business processes that cross organisati...
Dean Kuo, Alan Fekete, Paul Greenfield, Julian Jan...