Sciweavers

42388 search results - page 8311 / 8478
» Classification Using Information
Sort
View
FC
2004
Springer
105views Cryptology» more  FC 2004»
15 years 8 months ago
Secure Generalized Vickrey Auction without Third-party Servers
This paper presents a secure Generalized Vickrey Auction (GVA) scheme that does not require third-party servers, i.e., the scheme is executed only by an auctioneer and bidders. Com...
Makoto Yokoo, Koutarou Suzuki
FQAS
2004
Springer
104views Database» more  FQAS 2004»
15 years 8 months ago
Logic-Based Integration of Query Answering and Knowledge Discovery
Abstract. There is currently great interest in integrating knowledge discovery research into mainstream database systems. Such an enterprise is nontrivial because knowledge discove...
Marcelo A. T. Aragão, Alvaro A. A. Fernande...
ICMI
2004
Springer
179views Biometrics» more  ICMI 2004»
15 years 8 months ago
Visual touchpad: a two-handed gestural input device
This paper presents the Visual Touchpad, a low-cost vision-based input device that allows for fluid two-handed interactions with desktop PCs, laptops, public kiosks, or large wall...
Shahzad Malik, Joseph Laszlo
IFIP
2004
Springer
15 years 8 months ago
High Throughput Route Selection in Multi-rate Ad Hoc Wireless Networks
Abstract— An ad hoc wireless network is an autonomous selforganizing system of mobile nodes connected by wireless links where nodes not in direct range communicate via intermedia...
Baruch Awerbuch, David Holmer, Herbert Rubens
IFL
2004
Springer
122views Formal Methods» more  IFL 2004»
15 years 8 months ago
Source-Based Trace Exploration
Abstract. Tracing a computation is a key method for program comprehension and debugging. Hat is a tracing system for Haskell 98 programs. During a computation a trace is recorded i...
Olaf Chitil
« Prev « First page 8311 / 8478 Last » Next »