Sciweavers

859 search results - page 115 / 172
» The Changing Face of Cryptography
Sort
View
EUROCRYPT
2010
Springer
15 years 4 months ago
Adaptively Secure Broadcast
A broadcast protocol allows a sender to distribute a message through a point-to-point network to a set of parties, such that (i) all parties receive the same message, even if the s...
Martin Hirt, Vassilis Zikas
CHI
2010
ACM
15 years 6 months ago
Mobile-izing health workers in rural India
Researchers have long been interested in the potential of ICTs to enable positive change in developing regions communities. In these environments, ICT interventions often fail bec...
Divya Ramachandran, John Canny, Prabhu Dutta Das, ...
SMA
2003
ACM
138views Solid Modeling» more  SMA 2003»
15 years 5 months ago
Associativity between feature models across domains
Associativity between feature models implies the automatic updating of different feature models of a part after changes are made in one of its feature models. This is an importan...
S. Subramani, Balan Gurumoorthy
ICPR
2002
IEEE
15 years 4 months ago
Feasibility of Hough-Transform-Based Iris Localisation for Real-Time-Application
We present a fast method for locating iris features in frontal face images based on the Hough transform. It consists of an initial iris detection step and a tracking step which us...
Klaus D. Tönnies, Frank Behrens, Melanie Aurn...
ECBS
1999
IEEE
171views Hardware» more  ECBS 1999»
15 years 4 months ago
Metamodeling - Rapid Design and Evolution of Domain-Specific Modeling Environments
Model integrated computing (MIC) is gaining increased attention as an effective and efficient method for developing, maintaining, and evolving large-scale, domain-specific softwar...
Greg Nordstrom, Janos Sztipanovits, Gabor Karsai, ...