Sciweavers

141 search results - page 20 / 29
» ideal 2003
Sort
View
ACNS
2003
Springer
130views Cryptology» more  ACNS 2003»
14 years 3 months ago
Generalized Key-Evolving Signature Schemes or How to Foil an Armed Adversary
Key exposures, known or inconspicuous, are a real security threat. Recovery mechanisms from such exposures are required. For digital signatures such a recovery should ideally —an...
Gene Itkis, Peng Xie
CP
2003
Springer
14 years 3 months ago
Using the Breakout Algorithm to Identify Hard and Unsolvable Subproblems
Abstract. Local search algorithms have been very successful for solving constraint satisfaction problems (CSP). However, a major weakness has been that local search is unable to de...
Carlos Eisenberg, Boi Faltings
ESTIMEDIA
2003
Springer
14 years 3 months ago
Run-Time Scheduling for Multimedia Applications on Dynamically Reconfigurable Systems
Current multimedia applications are characterized by highly dynamic and non-deterministic behavior as well as high-performance requirements. In addition, portable devices demand a...
Javier Resano, Diederik Verkest, Daniel Mozos, Ser...
HUMAN
2003
Springer
14 years 3 months ago
Admission Control for TCP Connections in QoS IP Network
The paper describes a new admission control (AC) algorithm for greedy TCP connections. The algorithm has passed positive tests in preproduction QoS IP network [2], developed inside...
Wojciech Burakowski, Halina Tarasiuk
ICMI
2003
Springer
164views Biometrics» more  ICMI 2003»
14 years 3 months ago
A visually grounded natural language interface for reference to spatial scenes
Many user interfaces, from graphic design programs to navigation aids in cars, share a virtual space with the user. Such applications are often ideal candidates for speech interfa...
Peter Gorniak, Deb Roy