Sciweavers

633 search results - page 120 / 127
» A Few Constructions on Constructors
Sort
View
CAGD
2007
156views more  CAGD 2007»
14 years 11 months ago
A control polygon scheme for design of planar C2 PH quintic spline curves
A scheme to specify planar C2 Pythagorean-hodograph (PH) quintic spline curves by control polygons is proposed, in which the “ordinary” C2 cubic B-spline curve serves as a ref...
Francesca Pelosi, Maria Lucia Sampoli, Rida T. Far...
IEICET
2006
108views more  IEICET 2006»
14 years 11 months ago
Plaintext Simulatability
We propose a new security class, called plaintext-simulatability, defined over the public-key encryption schemes. The notion of plaintext simulatability (denoted PS) is similar to ...
Eiichiro Fujisaki
JAIR
2008
102views more  JAIR 2008»
14 years 11 months ago
An Ordinal Bargaining Solution with Fixed-Point Property
Shapley's impossibility result indicates that the two-person bargaining problem has no non-trivial ordinal solution with the traditional game-theoretic bargaining model. Alth...
Dongmo Zhang, Yan Zhang
IJWIS
2006
91views more  IJWIS 2006»
14 years 11 months ago
Handheld Computing and Programming for Mobile Commerce
: Using Internet-enabled mobile handheld devices to access the World Wide Web is a promising addition to the Web and traditional e-commerce. Mobile handheld devices provide conveni...
Wen-Chen Hu, Jyh-haw Yeh, Lixin Fu, Hung-Jen Yang
93
Voted
JUCS
2008
113views more  JUCS 2008»
14 years 11 months ago
What is Correctness of Security Protocols?
: As soon as major protocol flaws were discovered empirically -- a good luck that is not older than the early 1990s -- this title question came up to the world. It was soon realise...
Giampaolo Bella