Sciweavers

323 search results - page 31 / 65
» Doing it right
Sort
View
SMI
2005
IEEE
100views Image Analysis» more  SMI 2005»
15 years 5 months ago
Robust Particle Systems for Curvature Dependent Sampling of Implicit Surfaces
Recent research on point-based surface representations suggests that point sets may be a viable alternative to parametric surface representations in applications where the topolog...
Miriah D. Meyer, Pierre Georgel, Ross T. Whitaker
SOUPS
2005
ACM
15 years 5 months ago
Usable security and privacy: a case study of developing privacy management tools
Privacy is a concept which received relatively little attention during the rapid growth and spread of information technology through the 1980’s and 1990’s. Design to make info...
Carolyn Brodie, Clare-Marie Karat, John Karat, Jin...
CALCO
2005
Springer
119views Mathematics» more  CALCO 2005»
15 years 5 months ago
The Category Theoretic Solution of Recursive Program Schemes
This paper provides a general account of the notion of recursive program schemes, studying both uninterpreted and interpreted solutions. It can be regarded as the category-theoret...
Stefan Milius, Lawrence S. Moss
ITRUST
2005
Springer
15 years 5 months ago
Interactive Credential Negotiation for Stateful Business Processes
Business Processes for Web Services are the new paradigm for lightweight enterprise integration. They cross organizational boundaries, are provided by entities that see each other ...
Hristo Koshutanski, Fabio Massacci
ARCS
2004
Springer
15 years 5 months ago
Cryptonite - A Programmable Crypto Processor Architecture for High-Bandwidth Applications
Cryptographic methods are widely used within networking and digital rights management. Numerous algorithms exist, e.g. spanning VPNs or distributing sensitive data over a shared ne...
Rainer Buchty, Nevin Heintze, Dino Oliva