Sciweavers

16606 search results - page 3215 / 3322
» Context Modeling: Task Model and Practice Model
Sort
View
133
Voted
PKC
2004
Springer
106views Cryptology» more  PKC 2004»
15 years 9 months ago
On the Security of Multiple Encryption or CCA-security+CCA-security=CCA-security?
In a practical system, a message is often encrypted more than once by different encryptions, here called multiple encryption, to enhance its security. Additionally, new features ...
Rui Zhang 0002, Goichiro Hanaoka, Junji Shikata, H...
127
Voted
RT
2004
Springer
15 years 9 months ago
All-Frequency Precomputed Radiance Transfer for Glossy Objects
We introduce a method based on precomputed radiance transfer (PRT) that allows interactive rendering of glossy surfaces and includes shadowing effects from dynamic, “all-frequen...
Xinguo Liu, Peter-Pike J. Sloan, Heung-Yeung Shum,...
120
Voted
APSEC
2003
IEEE
15 years 9 months ago
Understanding How the Requirements Are Implemented in Source Code
For software maintenance and evolution, a common problem is to understand how each requirement is implemented in the source code. The basic solution of this problem is to find the...
Wei Zhao, Lu Zhang, Yin Liu, Jing Luo, Jiasu Sun
123
Voted
HICSS
2003
IEEE
140views Biometrics» more  HICSS 2003»
15 years 9 months ago
The Effects of Time and Personality on the Productivity of Management Information Systems
The paper studies the relationship between information technology (IT), time personality and managerial productivity. Time personality is captured by concepts of polychronicity an...
Vladimir Kvassov
148
Voted
WCRE
2003
IEEE
15 years 9 months ago
Toward an environment for comprehending distributed systems
Many modern software systems are often large, distributed, written in more than one programming language, and developed using pre-built components. This paper presents the results...
Maher Salah, Spiros Mancoridis
« Prev « First page 3215 / 3322 Last » Next »