Sciweavers

4190 search results - page 477 / 838
» Implementing commitment-based interactions
Sort
View
135
Voted
TCC
2004
Springer
100views Cryptology» more  TCC 2004»
15 years 9 months ago
On the Random-Oracle Methodology as Applied to Length-Restricted Signature Schemes
In earlier work, we described a “pathological” example of a signature scheme that is secure in the Random Oracle Model, but for which no secure implementation exists. For that...
Ran Canetti, Oded Goldreich, Shai Halevi
UPP
2004
Springer
15 years 9 months ago
Higher-Order Chemical Programming Style
The chemical reaction metaphor describes computation in terms of a chemical solution in which molecules interact freely according to reaction rules. Chemical solutions are represen...
Jean-Pierre Banâtre, Pascal Fradet, Yann Rad...
CVPR
2003
IEEE
15 years 9 months ago
Graph-Theoretic Approach to Clustering and Segmentation
We develop a framework for the image segmentation problem based on a new graph-theoretic formulation of clustering. The approach is motivated by the analogies between the intuitiv...
Massimiliano Pavan, Marcello Pelillo
EDOC
2003
IEEE
15 years 9 months ago
An Extensible Binding Framework for Component-Based Middleware
One of the most significant limitations of current middleware platforms, both commercial and research, is that they typically support only a small, pre-defined, set of fundamental...
Nikos Parlavantzas, Geoff Coulson, Gordon S. Blair
HAPTICS
2003
IEEE
15 years 9 months ago
Designing the Haptic Turntable for Musical Control
In this paper, we discuss the design and implementation of D’Groove, an intelligent Disc Jockey (DJ) system that features the use of haptic force feedback to expand the expressi...
Tim Beamish, Karon E. MacLean, Sidney Fels