Sciweavers

6300 search results - page 1174 / 1260
» We have it easy, but do we have it right
Sort
View
EUROCRYPT
2005
Springer
15 years 6 months ago
Secure Remote Authentication Using Biometric Data
Biometric data offer a potential source of high-entropy, secret information that can be used in cryptographic protocols provided two issues are addressed: (1) biometric data are n...
Xavier Boyen, Yevgeniy Dodis, Jonathan Katz, Rafai...
128
Voted
KES
2005
Springer
15 years 6 months ago
Ontology Modeling and Storage System for Robot Context Understanding
Abstract. A mobile robot that interacts with its environment needs a machineunderstandable representation of objects and their usages. We present an ontology of objects, with gener...
Eric Wang, Yong Se Kim, Hak Soo Kim, Jin Hyun Son,...
80
Voted
OOPSLA
2005
Springer
15 years 6 months ago
Ercatons and organic programming: say good-bye to planned economy
Organic programming (OP) is our proposed and already emerging programming model which overcomes some of the limitations of current practice in software development in general and ...
Oliver Imbusch, Falk Langhammer, Guido von Walter
98
Voted
RTA
2005
Springer
15 years 6 months ago
Arithmetic as a Theory Modulo
We present constructive arithmetic in Deduction modulo with rewrite rules only. In natural deduction and in sequent calculus, the cut elimination theorem and the analysis of the st...
Gilles Dowek, Benjamin Werner
112
Voted
TCC
2005
Springer
116views Cryptology» more  TCC 2005»
15 years 6 months ago
Error Correction in the Bounded Storage Model
We initiate a study of Maurer’s bounded storage model (JoC, 1992) in presence of transmission errors and perhaps other types of errors that cause different parties to have incon...
Yan Zong Ding
« Prev « First page 1174 / 1260 Last » Next »