Sciweavers

22698 search results - page 4394 / 4540
» Modeling in Software Engineering
Sort
View
ACMSE
1995
ACM
15 years 1 months ago
Database management for multimedia distributed collaborative writing
{ Traditional computer applications have been designed to be run by one user at a time who does some work in a single medium, such as ASCII text, and very little regard has been gi...
A. Wesley Wear, Yu Gong, Kai H. Chang
ASIACRYPT
2009
Springer
15 years 1 months ago
Hedged Public-Key Encryption: How to Protect against Bad Randomness
Abstract. Public-key encryption schemes rely for their IND-CPA security on per-message fresh randomness. In practice, randomness may be of poor quality for a variety of reasons, le...
Mihir Bellare, Zvika Brakerski, Moni Naor, Thomas ...
71
Voted
SCA
2007
15 years 17 days ago
Animation collage
We propose a method to automatically transform mesh animations into animation collages, i.e. moving assemblies of shape primitives from a database given by an artist. An animation...
Christian Theobalt, Christian Rössl, Edilson ...
SGP
2007
15 years 17 days ago
Example-based skeleton extraction
We present a method for extracting a hierarchical, rigid skeleton from a set of example poses. We then use this skeleton to not only reproduce the example poses, but create new de...
Scott Schaefer, Can Yuksel
LISA
2007
15 years 14 days ago
Secure Isolation of Untrusted Legacy Applications
Existing applications often contain security holes that are not patched until after the system has already been compromised. Even when software updates are available, applying the...
Shaya Potter, Jason Nieh, Matt Selsky
« Prev « First page 4394 / 4540 Last » Next »