Sciweavers

755 search results - page 147 / 151
» ideas 2005
Sort
View
CCS
2008
ACM
13 years 11 months ago
Multi-use unidirectional proxy re-signatures
In 1998, Blaze, Bleumer, and Strauss suggested a cryptographic primitive termed proxy re-signature in which a proxy transforms a signature computed under Alice's secret key in...
Benoît Libert, Damien Vergnaud
AAIM
2005
Springer
119views Algorithms» more  AAIM 2005»
13 years 11 months ago
Locating Performance Monitoring Mobile Agents in Scalable Active Networks
The idea of active networks has been emerged in recent years to increase the processing power inside the network. The intermediate nodes such as routers will be able to host mobile...
Amir Hossein Hadad, Mehdi Dehghan, Hossein Pedram
ASSETS
2005
ACM
13 years 11 months ago
Automatic production of tactile graphics from scalable vector graphics
This paper presents a method to convert vector graphics into tactile representations for the blind. Generating tactile pictures from vector graphics is an important effort to bri...
Stephen E. Krufka, Kenneth E. Barner
CANDC
2005
ACM
13 years 11 months ago
The development of a cybernetic sculptor: Edward Ihnatowicz and the senster
Edward Ihnatowicz (1926-1988) built one of the world’s first computer-controlled robotic sculptures, The Senster, in 196870. Rather than concentrate entirely on this groundbreak...
Aleksandar Zivanovic
CASES
2005
ACM
13 years 11 months ago
SECA: security-enhanced communication architecture
In this work, we propose and investigate the idea of enhancing a System-on-Chip (SoC) communication architecture (the fabric that integrates system components and carries the comm...
Joel Coburn, Srivaths Ravi, Anand Raghunathan, Sri...