Up a level |
(2005) COMPASS2008: The Smart Dining Service.
(2005) COMPASS2008: Multimodal, Multilingual and Crosslingual Interaction for Mobile Tourist Guide Applications.
(2005) Quantifying Probabilistic Information Flow in Computational Reactive Systems.
(2005) Public-Key Steganography with Active Attacks.
(2005) Lazy Revocation in Cryptographic File Systems.
(2005) Anonymous yet accountable access control.
(2005) Compositional Analysis of Contract Signing Protocols.
(2005) A Cryptographically Sound Dolev-Yao Style Security Proof of an Electronic Payment System.
(2005) Tailoring the Dolev-Yao Abstraction to Web Services Realities - A Comprehensive Wish List.
(2005) On Fairness in Simulatability-based Cryptographic Systems.
(2005) Limits of the Cryptographic Realization of Dolev-Yao-style XOR.
(2005) Relating Symbolic and Cryptographic Secrecy.
(2005) Seamless Combination of Shared and Personalized Information Presentation to Groups of Visitors in Active Museums - Research Agenda.
(2005) Tangible UIs for media control: probes into the design space.
(2005) Intrinsic dimensionality estimation of submanifolds in Rd.
(2005) From Graphs to Manifolds - Weak and Strong Pointwise Consistency of Graph Laplacians.
(2005) Hilbertian Metrics and Positive Definite Kernels on Probability Measures.
(2005) Contingent Planning via Heuristic Forward Search witn Implicit Belief States.
(2005) A Covering Problem for Hypercubes.
(2005) Polynomial Runtime in Simulatability Definitions.
(2005) Comparing Two Notions of Simulatability.
(2005) On the Notion of Statistical Security in Simulatability Definitions.
(2005) Multi-user and ubiquitous user interfaces: (MU3I 2005).
(2005) Adaptive navigation support with public displays.
(2005) Performing Physical Object References with Migrating Virtual Characters.
(2005) Seamless Information Presentation in Instrumented Environments through Object Associated Displays.
(2005) An asynchronous and secure ascending peer-to-peer auction.
(2005) The rotating compass: a novel interaction technique for mobile navigation.
(2005) Conclusion of contracts by electronic agents.
(2005) Product Associated Displays in a Shopping Scenario.
(2005) Integrating Intra and Extra Gestures into a Mobile and Multimodal Shopping Assistant.
(2005) Unifying Simulatability Definitions in Cryptographic Systems under Different Timing Assumptions.
(2005) Relating Symbolic and Cryptographic Secrecy.
(2005) Reactively Secure Signature Schemes.
(2005) Symmetric Authentication Within a Simulatable Cryptographic Library.
(2005) Signaturen durch elektronische Agenten.
(2005) Maximal margin classification for metric spaces.
(2005) Where 'Ignoring Delete Lists' Works: Local Search Topology in Planning Benchmarks.
(2005) The Deterministic Part of IPC-4: An Overview.
(2005) Preface to the Special Issue on User Modeling in Ubiquitous Computing.
(2005) Adaptive multimodal presentation of multimedia content in museum scenarios.
(2005) In defense of PDDL axioms.
(2005) Geometrical aspects of statistical learning theory.
(2005) Proceedings of the First Internaltional Workshop on Personalized Context Modeling and Management for UbiComp Applications, ubiPCMM 2005, Tokyo, Japan, September 11, 2005.
(2005) Smart Graphics, 5th International Symposium, SG 2005, Frauenwörth Cloister, Germany, August 22-24, 2005, Proceedings.
(2005) Proceedings of 3rd International Workshop on Security and Concurrency (SecCo), affiliated with CONCUR'05, San Francisco, CA.
(2005) Oblivious Transfer is Incomplete for Deniable Protocols.
(2005) Relations among Statistical Security Notions - or - Why Exponential Adversaries are Unlimited.