Sciweavers

5799 search results - page 276 / 1160
» Position Paper
Sort
View
CISC
2006
Springer
104views Cryptology» more  CISC 2006»
15 years 8 months ago
Batch Decryption of Encrypted Short Messages and Its Application on Concurrent SSL Handshakes
Abstract. A public-key cryptosystem is usually used for key management, in particular to session key management. The paper presents a method for handling a batch of concurrent keys...
Yongdong Wu, Feng Bao
CLEAR
2006
Springer
102views Biometrics» more  CLEAR 2006»
15 years 8 months ago
2D Multi-person Tracking: A Comparative Study in AMI Meetings
Abstract. In this paper, we present the findings of the Augmented Multiparty Interaction (AMI) project investigation on the localization and tracking of 2D head positions in meetin...
Kevin Smith, Sascha Schreiber, Igor Potucek, V&iac...
EUROMICRO
2004
IEEE
15 years 8 months ago
Introducing Agile Methods: Three Years of Experience
The paper summarizes three years of experience of introducing agile practices in academic environments. The perceptions of students from four different academic programs (Diploma,...
Grigori Melnik, Frank Maurer
CLEF
2006
Springer
15 years 8 months ago
Answer Validation Through Robust Logical Inference
Abstract. The paper features MAVE, a knowledge-based system for answer validation through deep linguistic processing and logical inference. A relaxation loop is used to determine a...
Ingo Glöckner
EUROCRYPT
2000
Springer
15 years 8 months ago
Construction of Nonlinear Boolean Functions with Important Cryptographic Properties
Abstract. This paper addresses the problem of obtaining new construction methods for cryptographically significant Boolean functions. We show that for each positive integer m, ther...
Palash Sarkar, Subhamoy Maitra