Sciweavers

5615 search results - page 982 / 1123
» Active Learner Modelling
Sort
View
130
Voted
ISADS
1999
IEEE
15 years 8 months ago
A Secure Key Registration System based on Proactive Secret-Sharing Scheme
We designed a secure key registration system based on the proactive secret-sharing scheme. A user can register important data such as a session key to a distributed system in a (t...
Masayuki Numao
152
Voted
ER
1999
Springer
160views Database» more  ER 1999»
15 years 8 months ago
Developing an Object-Oriented Video Database System with Spatio-Temporal Reasoning Capabilities
Video data management (VDM) is fast becoming one of seminar topics in multimedia information systems. In VDM systems, there exists an important need for novel techniques and mechan...
Shermann S.-M. Chan, Qing Li
127
Voted
METRICS
1999
IEEE
15 years 8 months ago
Measurements Should Generate Value, Rather than Data
Success factors for measurement programs as identified in the literature typically focus on the `internals' of the measurement program: incremental implementation, support fr...
Frank Niessink, Hans van Vliet
120
Voted
ICSE
1999
IEEE-ACM
15 years 8 months ago
Using Off-the-Shelf Middleware to Implement Connectors in Distributed Software Architectures
Software architectures promote development focused on modular building blocks and their interconnections. Since architecture-level components often contain complex functionality, ...
Eric M. Dashofy, Nenad Medvidovic, Richard N. Tayl...
128
Voted
PKC
1999
Springer
102views Cryptology» more  PKC 1999»
15 years 8 months ago
How to Enhance the Security of Public-Key Encryption at Minimum Cost
This paper presents a simple and efficient conversion from a semantically secure public-key encryption scheme against passive adversaries to a non-malleable (or semantically secure...
Eiichiro Fujisaki, Tatsuaki Okamoto