Sciweavers

18155 search results - page 3328 / 3631
» Point
Sort
View
CTRSA
2003
Springer
116views Cryptology» more  CTRSA 2003»
15 years 9 months ago
Intrusion-Resilient Public-Key Encryption
Exposure of secret keys seems to be inevitable, and may in practice represent the most likely point of failure in a cryptographic system. Recently, the notion of intrusion-resilien...
Yevgeniy Dodis, Matthew K. Franklin, Jonathan Katz...
DAGM
2003
Springer
15 years 9 months ago
Learning Human-Like Opponent Behavior for Interactive Computer Games
Compared to their ancestors in the early 1970s, present day computer games are of incredible complexity and show magnificent graphical performance. However, in programming intelli...
Christian Bauckhage, Christian Thurau, Gerhard Sag...
DGCI
2003
Springer
15 years 9 months ago
Shape Similarity and Visual Parts
Abstract. Human perception of shape is based on visual parts of objects to a point that a single, significant visual part is sufficient to recognize the whole object. For example,...
Longin Jan Latecki, Rolf Lakämper, Diedrich W...
DIGITALCITIES
2003
Springer
15 years 9 months ago
Map-Based Range Query Processing for Geographic Web Search Systems
In order to utilize geographic web information for digital city applications, we have been developing a geographic web search system, KyotoSEARCH. When users retrieve geographic in...
Ryong Lee, H. Shiina, Taro Tezuka, Yusuke Yokota, ...
DSOM
2003
Springer
15 years 9 months ago
Idiosyncratic Signatures for Authenticated Execution of Management Code
TrustedFlow™ is a software solution to the problem of remotely authenticating code during execution. A continuous flow of idiosyncratic signatures assures that the software from ...
Mario Baldi, Yoram Ofek, Moti Yung
« Prev « First page 3328 / 3631 Last » Next »