Sciweavers

1307 search results - page 139 / 262
» Follow the intellectual property
Sort
View
SIBGRAPI
2003
IEEE
15 years 7 months ago
A Hole-Filling Strategy for Reconstruction of Smooth Surfaces in Range Images
Creating models of real scenes is a complex task for which the use of traditional modelling techniques is inappropriate. For this task, laser rangefinders are frequently used to s...
Jianning Wang, Manuel M. Oliveira
AGENTCL
2003
Springer
15 years 7 months ago
A Cooperative Dialogue Game for Resolving Ontological Discrepancies
The goal of this paper is to present a computational framework that enables us to generate elementary speech act sequences in a dialogue between an electronic assistant and a compu...
Robbert-Jan Beun, Rogier M. van Eijk
TRUST
2010
Springer
15 years 6 months ago
Requirements for an Integrity-Protected Hypervisor on the x86 Hardware Virtualized Architecture
Virtualization has been purported to be a panacea for many security problems. We analyze the feasibility of constructing an integrity-protected hypervisor on contemporary x86 hardw...
Amit Vasudevan, Jonathan M. McCune, Ning Qu, Leend...
166
Voted
ACNS
2010
Springer
200views Cryptology» more  ACNS 2010»
15 years 6 months ago
Deniable Internet Key Exchange
In this work, we develop a family of protocols for deniable Internet Key-Exchange (IKE) with the following properties: • Highly practical efficiency, and conceptual simplicity a...
Andrew Chi-Chih Yao, Yunlei Zhao
EUROCRYPT
2010
Springer
15 years 6 months ago
Converting Pairing-Based Cryptosystems from Composite-Order Groups to Prime-Order Groups
We develop an abstract framework that encompasses the key properties of bilinear groups of composite order that are required to construct secure pairing-based cryptosystems, and we...
David Mandell Freeman