Sciweavers

23589 search results - page 4516 / 4718
» Uncheatable Distributed Computations
Sort
View
NDSS
2000
IEEE
15 years 6 months ago
A First Step Towards the Automatic Generation of Security Protocols
This paper describes automatic protocol generation (APG for short), a novel mechanism to generate security protocols automatically. With APG, the protocol designer inputs the spec...
Adrian Perrig, Dawn Xiaodong Song
MOBIHOC
2000
ACM
15 years 6 months ago
Low power rendezvous in embedded wireless networks
ln the future, wireless networking will be embedded into a wide variety of common, everyday objects [1]. In many embedded networking situations, the communicating nodes will be ver...
Terry Todd, Frazer Bennett, Alan Jones
SIGCSE
2000
ACM
453views Education» more  SIGCSE 2000»
15 years 6 months ago
Aristotle and object-oriented programming: why modern students need traditional logic
Classifying is a central activity in object-oriented programming and distinguishes it from procedural programming. Traditional logic, initiated by Aristotle, assigns classificatio...
Derek Rayside, Gerard T. Campbell
ADBIS
2000
Springer
166views Database» more  ADBIS 2000»
15 years 6 months ago
Integrating Bibliographical Data from Heterogeneous Digital Libraries
The integration of bibliographical data today is considered one of the most important tasks in the area of digital libraries. Various available sources of bibliographical informati...
Eike Schallehn, Martin Endig, Kai-Uwe Sattler
ECCV
2000
Springer
15 years 6 months ago
Anti-Faces for Detection
This paper offers a novel detection method, which works well even in the case of a complicated image collection – for instance, a frontal face under a large class of linear tran...
Daniel Keren, Margarita Osadchy, Craig Gotsman
« Prev « First page 4516 / 4718 Last » Next »