Sciweavers

2625 search results - page 86 / 525
» Applications 2000
Sort
View
116
Voted
PKC
2000
Springer
84views Cryptology» more  PKC 2000»
15 years 7 months ago
Forward Secrecy and Its Application to Future Mobile Communications Security
Abstract. Perfect forward secrecy, one of the possible security features provided by key establishment protocols, concerns dependency of a session key upon long-term secret keys (s...
DongGook Park, Colin Boyd, Sang-Jae Moon
145
Voted
AAAI
2000
15 years 5 months ago
Human-Level AI's Killer Application: Interactive Computer Games
Although one of the fundamental goals of AI is to understand and develop intelligent systems that have all of the capabilities of humans, there is little active research directly ...
John E. Laird, Michael van Lent
117
Voted
DBSEC
2000
112views Database» more  DBSEC 2000»
15 years 5 months ago
Coordinating Policy for Federated Applications
Abstract At the start of its present term of office in 1997 the UK government published a planning document promising ubiquitous access to Electronic Health Records (EHRs) held wit...
Ken Moody
103
Voted
ECIS
2000
15 years 5 months ago
Design Breakdowns, Scenarios and Rapid Application Development
- In this paper we consider the way in which two representational forms, scenarios and design breakdowns, which have emerged in the tradition of participatory design are relevant w...
Paul Beynon-Davies
101
Voted
AGIS
2000
54views more  AGIS 2000»
15 years 3 months ago
The Application of Earth Science Findings to the Practical Problems of Growing Winegrapes
Transforming science findings into practical applications is presented in the specific case of using remote sensing to detect the presence of an infestation of grapevines. The vin...
David L. Peterson, Lee F. Johnson