Sciweavers

17049 search results - page 193 / 3410
» cans 2007
Sort
View
DGO
2003
118views Education» more  DGO 2003»
15 years 12 days ago
Enabling Email Confidentiality through the use of Opportunistic Encryption
Software for encrypting email messages has been widely available for more than 15 years, but the emailusing public has failed to adopt secure messaging. This failure can be explai...
Simson L. Garfinkel
HCI
2001
15 years 12 days ago
Intelligent interfaces for universal access: challenges and promise
This article outlines some challenges and opportunities in the area of universal access to intelligent interfaces. Technological advances in computing and communication together w...
Mark T. Maybury
ISCAPDCS
2004
15 years 12 days ago
Practical Byzantine Fault Tolerance Using Fewer than 3f+1 Active Replicas
Byzantine fault tolerant state machine replication (BFT-SMR) is a foundation for implementations of highly reliable services. Existing algorithms for BFT-SMR require at least 3f +...
Ming Li, Yuval Tamir
DICTA
2003
15 years 12 days ago
Towards Closed Form Solutions to the MultiView Constraints of Curves and Surfaces
In this paper we present the theoretical setting for the closed form solutions to the multiview constraints of curves and surfaces observed by the motion of a camera in a scene. We...
David N. R. McKinnon, Brian C. Lovell
ISTA
2004
15 years 12 days ago
Object-Relational Mapping Techniques for .NET Framework
: The paper concerns the problem of building an object-relational mapping framework based on the Microsoft .Net platform. The work uses design patterns methodology and proposes to ...
Anatoly E. Doroshenko, Vlad Romanenko