Sciweavers

596 search results - page 82 / 120
» Theories of Access Consciousness
Sort
View
DOCENG
2004
ACM
15 years 4 months ago
On modular transformation of structural content
We show that an XML DTD (Document Type Definition) can be viewed as the fixed point of a parametric content model. We then use natural transformations from the source content mo...
Tyng-Ruey Chuang, Jan-Li Lin
IUI
2004
ACM
15 years 4 months ago
SUPPLE: automatically generating user interfaces
In order to give people ubiquitous access to software applications, device controllers, and Internet services, it will be necessary to automatically adapt user interfaces to the c...
Krzysztof Gajos, Daniel S. Weld
WMASH
2004
ACM
15 years 4 months ago
Reputation-based Wi-Fi deployment protocols and security analysis
In recent years, wireless Internet service providers (WISPs) have established thousands of WiFi hot spots in cafes, hotels and airports in order to offer to travelling Internet u...
Naouel Ben Salem, Jean-Pierre Hubaux, Markus Jakob...
ADC
2004
Springer
87views Database» more  ADC 2004»
15 years 4 months ago
On the Computation of Approximations of Database Queries
Reflective Relational Machines were introduced by S. Abiteboul, C. Papadimitriou and V. Vianu in 1994, as variations of Turing machines which are suitable for the computation of ...
Flavio Antonio Ferrarotti, Jose Maria Turull Torre...
CRYPTO
2004
Springer
120views Cryptology» more  CRYPTO 2004»
15 years 4 months ago
Pseudo-signatures, Broadcast, and Multi-party Computation from Correlated Randomness
Unconditionally secure multi-party computations in general, and broadcast in particular, are impossible if any third of the players can be actively corrupted and if no additional i...
Matthias Fitzi, Stefan Wolf, Jürg Wullschlege...