Sciweavers

340 search results - page 42 / 68
» paste 2005
Sort
View
ACNS
2005
Springer
113views Cryptology» more  ACNS 2005»
15 years 3 months ago
A Traitor Tracing Scheme Based on RSA for Fast Decryption
Abstract. We describe a fully k-resilient traitor tracing scheme that utilizes RSA as a secret-key rather than public-key cryptosystem. Traitor tracing schemes deter piracy in broa...
John Patrick McGregor, Yiqun Lisa Yin, Ruby B. Lee
ADBIS
2005
Springer
163views Database» more  ADBIS 2005»
15 years 3 months ago
XML Databases and Beyond - Plenty of Architectural Challenges Ahead
A key observation is that the invariants in database management determine the mapping steps of the supporting architecture. Referring to the multi-layered architecture of record-or...
Theo Härder
APPROX
2005
Springer
79views Algorithms» more  APPROX 2005»
15 years 3 months ago
Reconstructive Dispersers and Hitting Set Generators
Abstract. We give a generic construction of an optimal hitting set generator (HSG) from any good “reconstructive” disperser. Past constructions of optimal HSGs have been based ...
Christopher Umans
70
Voted
ATAL
2005
Springer
15 years 3 months ago
Physical deployment of digital pheromones through RFID technology
Pheromone-based multiagent interaction has received a growing attention in the past few years. Still, so far, the number of deployed systems exploiting pheromones for coordinating...
Marco Mamei, Franco Zambonelli
ATAL
2005
Springer
15 years 3 months ago
The use of emotions to create believable agents in a virtual environment
In the past emotions have been dismissed as a distraction to the logical, scientific thought process. More recently however, the importance of emotion in human-like intelligence a...
Karthi Selvarajah, Debbie Richards