Sciweavers

340 search results - page 42 / 68
» paste 2005
Sort
View
ACNS
2005
Springer
113views Cryptology» more  ACNS 2005»
14 years 3 months ago
A Traitor Tracing Scheme Based on RSA for Fast Decryption
Abstract. We describe a fully k-resilient traitor tracing scheme that utilizes RSA as a secret-key rather than public-key cryptosystem. Traitor tracing schemes deter piracy in broa...
John Patrick McGregor, Yiqun Lisa Yin, Ruby B. Lee
ADBIS
2005
Springer
163views Database» more  ADBIS 2005»
14 years 3 months ago
XML Databases and Beyond - Plenty of Architectural Challenges Ahead
A key observation is that the invariants in database management determine the mapping steps of the supporting architecture. Referring to the multi-layered architecture of record-or...
Theo Härder
APPROX
2005
Springer
79views Algorithms» more  APPROX 2005»
14 years 3 months ago
Reconstructive Dispersers and Hitting Set Generators
Abstract. We give a generic construction of an optimal hitting set generator (HSG) from any good “reconstructive” disperser. Past constructions of optimal HSGs have been based ...
Christopher Umans
ATAL
2005
Springer
14 years 3 months ago
Physical deployment of digital pheromones through RFID technology
Pheromone-based multiagent interaction has received a growing attention in the past few years. Still, so far, the number of deployed systems exploiting pheromones for coordinating...
Marco Mamei, Franco Zambonelli
ATAL
2005
Springer
14 years 3 months ago
The use of emotions to create believable agents in a virtual environment
In the past emotions have been dismissed as a distraction to the logical, scientific thought process. More recently however, the importance of emotion in human-like intelligence a...
Karthi Selvarajah, Debbie Richards