Sciweavers

1172 search results - page 156 / 235
» Who killed design
Sort
View
ASIACRYPT
2000
Springer
14 years 2 months ago
Password-Authenticated Key Exchange Based on RSA
Abstract. There have been many proposals in recent years for passwordauthenticated key exchange protocols. Many of these have been shown to be insecure, and the only ones that seem...
Philip D. MacKenzie, Sarvar Patel, Ram Swaminathan
HICSS
1999
IEEE
113views Biometrics» more  HICSS 1999»
14 years 2 months ago
Judging People's Availability for Interaction from Video Snapshots
Several groupware systems support casual real time interaction over distance by providing periodically updated snapshots of other people's offices. People then monitor these ...
Brad Johnson, Saul Greenberg
ICDCS
1999
IEEE
14 years 2 months ago
Fault Tolerant Video on Demand Services
This paper describes a highly available distributedvideo on demand (VoD) service which is inherently fault tolerant. The VoD service is provided by multiple servers that reside at...
Tal Anker, Danny Dolev, Idit Keidar
APCHI
1998
IEEE
14 years 2 months ago
Tickertape: Notification and Communication in a Single Line
This paper outlines an awareness application called Tickertape. Tickertape is a tool that displays event notifications in the form of scrolling messages across a single-line windo...
Sara Parsowith, Geraldine Fitzpatrick, Simon M. Ka...
ISPAN
1997
IEEE
14 years 2 months ago
CASS: an efficient task management system for distributed memory architectures
The thesis of this research is that the task of exposing the parallelism in a given application should be left to the algorithm designer, who has intimate knowledge of the applica...
Jing-Chiou Liou, Michael A. Palis