Sciweavers

9974 search results - page 1872 / 1995
» Software Interconnection Models
Sort
View
123
Voted
ASIACRYPT
2009
Springer
15 years 5 months ago
Hedged Public-Key Encryption: How to Protect against Bad Randomness
Abstract. Public-key encryption schemes rely for their IND-CPA security on per-message fresh randomness. In practice, randomness may be of poor quality for a variety of reasons, le...
Mihir Bellare, Zvika Brakerski, Moni Naor, Thomas ...
DESRIST
2009
Springer
137views Education» more  DESRIST 2009»
15 years 5 months ago
Language communities in enterprise architecture research
As a result of the rigor vs. relevance debate, researchers who focus on design research on organizational problems are beginning to focus on their research methodology’s rigor. ...
Joachim Schelp, Robert Winter
93
Voted
SCA
2007
15 years 4 months ago
Animation collage
We propose a method to automatically transform mesh animations into animation collages, i.e. moving assemblies of shape primitives from a database given by an artist. An animation...
Christian Theobalt, Christian Rössl, Edilson ...
SGP
2007
15 years 4 months ago
Example-based skeleton extraction
We present a method for extracting a hierarchical, rigid skeleton from a set of example poses. We then use this skeleton to not only reproduce the example poses, but create new de...
Scott Schaefer, Can Yuksel
LISA
2007
15 years 4 months ago
Secure Isolation of Untrusted Legacy Applications
Existing applications often contain security holes that are not patched until after the system has already been compromised. Even when software updates are available, applying the...
Shaya Potter, Jason Nieh, Matt Selsky
« Prev « First page 1872 / 1995 Last » Next »