Sciweavers

2250 search results - page 155 / 450
» Authorizing applications in singularity
Sort
View
DSOM
2005
Springer
15 years 3 months ago
An Approach to Understanding Policy Based on Autonomy and Voluntary Cooperation
Presently, there is no satisfactory model for dealing with political autonomy of agents in policy based management. A theory of atomic policy units called ‘promises’ is therefo...
Mark Burgess
NORDICHI
2004
ACM
15 years 3 months ago
Interactive digital FogScreen
The walk-through FogScreen has become very popular and famous during recent years. It is an immaterial projection screen that consists of air and a little humidity, and enables hi...
Ismo Rakkolainen, Karri T. Palovuori
EVOW
2004
Springer
15 years 3 months ago
The Virtual Ecosystem as Generative Electronic Art
This paper proposes four desirable attributes of processes to be applied in generative electronic art. By example, it then demonstrates that the virtual ecosystem in its entirety i...
Alan Dorin
FSE
2004
Springer
110views Cryptology» more  FSE 2004»
15 years 3 months ago
VMPC One-Way Function and Stream Cipher
Abstract. A simple one-way function along with its proposed application in symmetric cryptography is described. The function is computable with three elementary operations on permu...
Bartosz Zoltak
PKC
2001
Springer
111views Cryptology» more  PKC 2001»
15 years 2 months ago
Cryptanalysis of PKP: A New Approach
Quite recently, in [4], a new time-memory tradeoff algorithm was presented. The original goal of this algorithm was to count the number of points on an elliptic curve, however, th...
Éliane Jaulmes, Antoine Joux