Sciweavers

1444 search results - page 148 / 289
» The end of users
Sort
View
CRYPTO
2001
Springer
202views Cryptology» more  CRYPTO 2001»
15 years 2 months ago
Revocation and Tracing Schemes for Stateless Receivers
We deal with the problem of a center sending a message to a group of users such that some subset of the users is considered revoked and should not be able to obtain the content of...
Dalit Naor, Moni Naor, Jeffery Lotspiech
QOFIS
2001
Springer
15 years 2 months ago
Constrained TCP-Friendly Congestion Control for Multimedia Communication
With the lack of admission control and resource reservation mechanisms in the Internet, overload situations can only be avoided by having the end systems deploying congestion cont...
Dorgham Sisalem, Adam Wolisz
IVC
2007
122views more  IVC 2007»
14 years 10 months ago
Adaptive surface inspection via interactive evolution
ct 7 An increasingly frequent application of Machine Vision technologies is in automated surface inspection for the detection of defects in 8 manufactured products. Such systems oï...
Praminda Caleb-Solly, Jim E. Smith
WWW
2008
ACM
15 years 10 months ago
A domain-specific language for the model-driven construction of advanced web-based dialogs
Complex dialogs with comprehensive underlying data models are gaining increasing importance in today's Web applications. This in turn accelerates the need for highly dynamic ...
Patrick Freudenstein, Martin Nussbaumer, Florian A...
CHI
2009
ACM
15 years 10 months ago
Longitudinal study of people learning to use continuous voice-based cursor control
We conducted a 2.5 week longitudinal study with five motor impaired (MI) and four non-impaired (NMI) participants, in which they learned to use the Vocal Joystick, a voice-based u...
Susumu Harada, Jacob O. Wobbrock, Jonathan Malkin,...