Sciweavers

5149 search results - page 619 / 1030
» Timed Asynchronous Distributed Systems
Sort
View
SRDS
1993
IEEE
15 years 9 months ago
Some Remarks on Protecting Weak Keys and Poorly-Chosen Secrets from Guessing Attacks
Authentication and key distribution protocols that utilize weak secrets (such as passwords and PINs) are traditionally susceptible to guessing attacks whereby an adversary iterate...
Gene Tsudik, Els Van Herreweghen
DEBS
2007
ACM
15 years 8 months ago
The arbitrary Boolean publish/subscribe model: making the case
In this paper, we present BoP, a content-based publish/subscribe system for arbitrary Boolean subscriptions and advertisements. BoP targets at the time and space-efficient matchin...
Sven Bittner, Annika Hinze
ATAL
2008
Springer
15 years 6 months ago
Shared focus of attention for heterogeneous agents
A network of cooperating agents must be able to reach rough consensus on a set of topics for cooperation. With highly heterogeneous agents, however, incommensurable measures and i...
Jacob Beal
DGO
2003
147views Education» more  DGO 2003»
15 years 6 months ago
A Framework for the Representation of Geospatial Image Processing Operations
Research advances in geospatial automated image analysis tools and feature extraction algorithms have matured in recent times to levels of practical applicability. The consolidati...
Vijay Venkataraman, Peggy Agouris
GRAPHICSINTERFACE
1996
15 years 6 months ago
Painting Gradients: Free-form Surface Design Using Shading Patterns
An interactive system for designing curved surfaces is proposed which is based on direct manipulation of a single-view shaded image of this surface. Apart from functions like carv...
Cornelius W. A. M. van Overveld