Sciweavers

15375 search results - page 211 / 3075
» cans 2008
Sort
View
DAM
2002
72views more  DAM 2002»
13 years 8 months ago
On the bound for anonymous secret sharing schemes
In anonymous secret sharing schemes, the secret can be reconstructed without knowledge of which participants hold which shares. In this paper, we derive a tighter lower bound on t...
Wataru Kishimoto, Koji Okada, Kaoru Kurosawa, Waka...
COMCOM
1998
81views more  COMCOM 1998»
13 years 7 months ago
Secure broadcasting in large networks
In this note, we show that a proposed secure broadcasting scheme is insecure. We also present a modified scheme to overcome this weakness. The modified scheme has the extra adva...
Hung-Min Sun, Shiuh-Pyng Shieh
DEBU
1998
100views more  DEBU 1998»
13 years 7 months ago
Interoperability, Distributed Applications and Distributed Databases: The Virtual Table Interface
Users of distributed databases and of distributed application frameworks require interoperation of heterogeneous data and components, respectively. In this paper, we examine how a...
Michael Stonebraker, Paul Brown, Martin Herbach
CGF
1999
87views more  CGF 1999»
13 years 7 months ago
Interactive Multiresolution Editing of Arbitrary Meshes
This paper presents a novel approach to multiresolution editing of a triangular mesh. The basic idea is to embed an editing area of a mesh onto a 2D rectangle and interpolate the ...
Seungyong Lee
CLEIEJ
1999
71views more  CLEIEJ 1999»
13 years 7 months ago
A Taxonomy for Comparing Distributed Object Technologies
This works goal is the definition of a set of criteria to be used as a reference for evaluation and comparison of existing distributed object technologies. In particular the defin...
A. Bracho, Alfredo Matteo, Christiane Metzner