Sciweavers

23704 search results - page 4665 / 4741
» Data and Information as Property
Sort
View
CRYPTO
1993
Springer
137views Cryptology» more  CRYPTO 1993»
15 years 6 months ago
Broadcast Encryption
A broadcast encryption scheme allows the sender to securely distribute data to a dynamically changing set of users over an insecure channel. One of the most challenging settings fo...
Amos Fiat, Moni Naor
ECCV
1994
Springer
15 years 6 months ago
Integration and Control of Reactive Visual Processes
This paper describes a new approach to the integration and control of continuously operating visual processes. Visual processes are expressed as transformations which map signals ...
James L. Crowley, Jean Marc Bedrune, Morten Bekker...
IUI
1993
ACM
15 years 6 months ago
Wizard of Oz studies: why and how
We discuss current approaches to the development of natural language dialogue systems, and claim that they do not sufficiently consider the unique qualities of man-machine intera...
Nils Dahlbäck, Arne Jönsson, Lars Ahrenb...
SIGMETRICS
1993
ACM
123views Hardware» more  SIGMETRICS 1993»
15 years 6 months ago
Effectiveness of Trace Sampling for Performance Debugging Tools
Recently there has been a surge of interest in developing performance debugging tools to help programmers tune their applications for better memory performance [2, 4, 10]. These t...
Margaret Martonosi, Anoop Gupta, Thomas E. Anderso...
PLDI
1990
ACM
15 years 6 months ago
A Fresh Look at Optimizing Array Bound Checking
- This paper describes techniques for optimizing range checks performed to detect array bound violations. In addition to the elimination of range check:s, the optimizations discuss...
Rajiv Gupta
« Prev « First page 4665 / 4741 Last » Next »