Sciweavers

2036 search results - page 336 / 408
» A generic type-and-effect system
Sort
View
146
Voted
LCN
1999
IEEE
15 years 4 months ago
AQuaFWiN: Adaptive QoS Framework for Multimedia in Wireless Networks and Its Comparison with other QoS Frameworks
In a wireless environment, due to topology changes and characteristics of media (interference in radio signals) the bandwidth of a link is unpredictable and possibly very low, the...
Bobby Vandalore, Raj Jain, Sonia Fahmy, Sudhir S. ...
116
Voted
PKC
1999
Springer
86views Cryptology» more  PKC 1999»
15 years 4 months ago
Preserving Privacy in Distributed Delegation with Fast Certificates
Abstract. In a distributed system, dynamically dividing execution between nodes is essential for service robustness. However, when all of the nodes cannot be equally trusted, and w...
Pekka Nikander, Yki Kortesniemi, Jonna Partanen
103
Voted
EUROCRYPT
1998
Springer
15 years 4 months ago
Strengthened Security for Blind Signatures
Abstract. Provable security is a very nice property for cryptographic protocols. Unfortunately, in many cases, this is at the cost of a considerable loss in terms of efficiency. Mo...
David Pointcheval
113
Voted
VW
1998
Springer
157views Virtual Reality» more  VW 1998»
15 years 4 months ago
Real Face Communication in a Virtual World
This paper describes an efficient method to make an individual face for animation from several possible inputs and how to use this result for a realistic talking head communication...
Won-Sook Lee, Elwin Lee, Nadia Magnenat-Thalmann
116
Voted
COMPSAC
1996
IEEE
15 years 4 months ago
Business Rule Extraction from Legacy Code
Business rules are operational rules that business organizationsfollow to peq%rm various activities. Over time, business rules evolve and the software that implemented them are al...
Hai Huang, Wei-Tek Tsai, Sourav Bhattacharya, Xiao...