Sciweavers

1172 search results - page 36 / 235
» Who killed design
Sort
View

Source Code
667views
15 years 4 months ago
A Toolbox of Level Set Methods
"This Toolbox is designed to minimize the sum of coding, execution and analysis time for those who want to explore level set methods. Computationally, Matlab is not the fastes...
Ian Mitchell
AVI
2004
13 years 9 months ago
Two methods for enhancing mutual awareness in a group recommender system
We present a group recommender system for vacations that helps group members who are not able to communicate synchronously to specify their preferences collaboratively and to arri...
Anthony Jameson, Stephan Baldes, Thomas Kleinbauer
IJSN
2006
123views more  IJSN 2006»
13 years 7 months ago
A survey of key evolving cryptosystems
: This paper presents a survey of key evolving cryptosystems in the public key setting, focusing on two main approaches: `forward security' and `intrusion resilience'. Th...
Matthew K. Franklin
RFIDSEC
2010
13 years 5 months ago
Tree-Based RFID Authentication Protocols Are Definitively Not Privacy-Friendly
Authentication for low-cost Radio-Frequency IDentification (RFID) is a booming research topic. The challenge is to develop secure protocols using lightweight cryptography, yet ensu...
Gildas Avoine, Benjamin Martin 0002, Tania Martin
IVA
2009
Springer
14 years 2 months ago
Varying Personality in Spoken Dialogue with a Virtual Human
We extend a virtual human architecture that has been used to build tactical questioning characters with a parameterizable personality model, allowing characters to be designed with...
Michael Rushforth, Sudeep Gandhe, Ron Artstein, An...