Sciweavers

6574 search results - page 39 / 1315
» Current Signatures: Application
Sort
View
VRML
2009
ACM
15 years 7 months ago
2LIP: filling the gap between the current and the three-dimensional web
In this article we present a novel approach, the 2-Layer Interface Paradigm (2LIP), for designing simple yet interactive 3D web applications, an attempt to marry advantages of 3D ...
Jacek Jankowski, Stefan Decker
104
Voted
ICPR
2008
IEEE
16 years 1 months ago
A probabilistic Self-Organizing Map for facial recognition
This article presents a method aiming at quantifying the visual similarity between an image and a class model. This kind of problem is recurrent in many applications such as objec...
Christophe Garcia, Grégoire Lefebvre
ACISP
2001
Springer
15 years 5 months ago
Elliptic Curve Cryptography on a Palm OS Device
The market for Personal Digital Assistants (PDA) is growing rapidly and PDAs are becoming increasingly interesting for commercial transactions. One requirement for further growing ...
André Weimerskirch, Christof Paar, Sheuelin...
116
Voted
CTRSA
2007
Springer
98views Cryptology» more  CTRSA 2007»
15 years 2 months ago
Identity-Based Multi-signatures from RSA
Abstract. Multi-signatures allow multiple signers to jointly authenticate a message using a single compact signature. Many applications however require the public keys of the signe...
Mihir Bellare, Gregory Neven
94
Voted
MASCOTS
2010
15 years 2 months ago
PAC: Pattern-driven Application Consolidation for Efficient Cloud Computing
To reduce cloud system resource cost, application consolidation is a must. In this paper, we present a novel patterndriven application consolidation (PAC) system to achieve efficie...
Zhenhuan Gong, Xiaohui Gu