Sciweavers

20175 search results - page 120 / 4035
» Is abstraction the key to computing
Sort
View
75
Voted
CCA
2009
Springer
15 years 7 months ago
Towards the Complexity of Riemann Mappings (Extended Abstract)
d Abstract) Robert Rettinger1 Department of Mathematics and Computer Science University of Hagen, Germany Abstract. We show that under reasonable assumptions there exist Riemann ma...
Robert Rettinger
78
Voted
AINA
2007
IEEE
15 years 4 months ago
A Certified Email Protocol Using Key Chains
This paper introduces an asynchronous optimistic certified email protocol, with stateless recipients, that relies on key chains to considerably reduce the storage requirements of t...
Jan Cederquist, Muhammad Torabi Dashti, Sjouke Mau...
PDCAT
2004
Springer
15 years 6 months ago
GridCrypt: High Performance Symmetric Key Cryptography Using Enterprise Grids
Today’s cryptanalysis on symmetric key cryptography is encouraging the use of larger key sizes and complex algorithms to achieve an unbreakable state. However, this leads an inc...
Agus Setiawan, David Adiutama, Julius Liman, Aksha...
CLUSTER
2000
IEEE
15 years 5 months ago
Agilent's Key Technologies in Remote System Management
Agilent Technologies Boeblingen Verification Solutions is offering a variety of remote system management products. This paper will summarize the key technologies on which Agilents...
Michael Herz
88
Voted
CHI
1996
ACM
15 years 4 months ago
SHK: Single Hand Key Card for Mobile Devices
A new input unit for mobile devices is discussed. High speed text input through touch typing and mouse data input is possible through an SHK: Single Hand Key card, "castanets...
Masakatsu Sugimoto, Kimiyo Takahashi