Up a level |
(2005) COMPASS2008: The Smart Dining Service.
(2005) COMPASS2008: Multimodal, Multilingual and Crosslingual Interaction for Mobile Tourist Guide Applications.
(2005) Quantifying Probabilistic Information Flow in Computational Reactive Systems.
(2005) Unifying Simulatability Definitions in Cryptographic Systems under Different Timing Assumptions.
(2005) Public-Key Steganography with Active Attacks.
(2005) Lazy Revocation in Cryptographic File Systems.
(2005) Anonymous yet accountable access control.
(2005) Compositional Analysis of Contract Signing Protocols.
(2005) A Cryptographically Sound Dolev-Yao Style Security Proof of an Electronic Payment System.
(2005) Tailoring the Dolev-Yao Abstraction to Web Services Realities - A Comprehensive Wish List.
(2005) On Fairness in Simulatability-based Cryptographic Systems.
(2005) Limits of the Cryptographic Realization of Dolev-Yao-style XOR.
(2005) Relating Symbolic and Cryptographic Secrecy.
(2005) Relating Symbolic and Cryptographic Secrecy.
(2005) Reactively Secure Signature Schemes.
(2005) Symmetric Authentication Within a Simulatable Cryptographic Library.
(2005) Proceedings of 3rd International Workshop on Security and Concurrency (SecCo), affiliated with CONCUR'05, San Francisco, CA.
(2005) Seamless Combination of Shared and Personalized Information Presentation to Groups of Visitors in Active Museums - Research Agenda.
(2005) Signaturen durch elektronische Agenten.
(2005) Tangible UIs for media control: probes into the design space.
(2005) Geometrical aspects of statistical learning theory.
(2005) Intrinsic dimensionality estimation of submanifolds in Rd.
(2005) From Graphs to Manifolds - Weak and Strong Pointwise Consistency of Graph Laplacians.
(2005) Hilbertian Metrics and Positive Definite Kernels on Probability Measures.
(2005) Maximal margin classification for metric spaces.
(2005) Where 'Ignoring Delete Lists' Works: Local Search Topology in Planning Benchmarks.
(2005) Contingent Planning via Heuristic Forward Search witn Implicit Belief States.
(2005) The Deterministic Part of IPC-4: An Overview.
(2005) A Covering Problem for Hypercubes.
(2005) Polynomial Runtime in Simulatability Definitions.
(2005) Comparing Two Notions of Simulatability.
(2005) On the Notion of Statistical Security in Simulatability Definitions.
(2005) Preface to the Special Issue on User Modeling in Ubiquitous Computing.
(2005) Multi-user and ubiquitous user interfaces: (MU3I 2005).
(2005) Adaptive navigation support with public displays.
(2005) Adaptive multimodal presentation of multimedia content in museum scenarios.
(2005) Performing Physical Object References with Migrating Virtual Characters.
(2005) Seamless Information Presentation in Instrumented Environments through Object Associated Displays.
(2005) Oblivious Transfer is Incomplete for Deniable Protocols.
(2005) An asynchronous and secure ascending peer-to-peer auction.
(2005) The rotating compass: a novel interaction technique for mobile navigation.
(2005) Conclusion of contracts by electronic agents.
(2005) Product Associated Displays in a Shopping Scenario.
(2005) In defense of PDDL axioms.
(2005) Relations among Statistical Security Notions - or - Why Exponential Adversaries are Unlimited.
(2005) Integrating Intra and Extra Gestures into a Mobile and Multimodal Shopping Assistant.