Sciweavers

35 search results - page 6 / 7
» What Happened in CLEF 2004
Sort
View
TCC
2004
Springer
147views Cryptology» more  TCC 2004»
13 years 10 months ago
Computational Collapse of Quantum State with Application to Oblivious Transfer
Quantum 2-party cryptography differs from its classical counterpart in at least one important way: Given blak-box access to a perfect commitment scheme there exists a secure 1−2...
Claude Crépeau, Paul Dumais, Dominic Mayers...
MM
2004
ACM
158views Multimedia» more  MM 2004»
13 years 10 months ago
"Sousveillance": inverse surveillance in multimedia imaging
This is a personal narrative that began 30 years ago as a childhood hobby, of wearing and implanting various sensors, effectors, and multimedia computation in order to re-define...
Steve Mann
WSC
2004
13 years 6 months ago
Using Simulated Data in Support of Research on Regression Analysis
Using simulated data to develop and study diagnostic tools for data analysis is very beneficial. The user can gain insight about what happens when assumptions are violated since t...
Christopher Michael Hill, Linda C. Malone
AR
2004
107views more  AR 2004»
13 years 5 months ago
Inevitable collision states - a step towards safer robots?
-- An inevitable collision state for a robotic system can be defined as a state for which, no matter what the future trajectory followed by the system is, a collision with an obsta...
Thierry Fraichard, Hajime Asama
ICAD
2004
13 years 6 months ago
Listening to the Mind Listening
The following explains what mappings have been chosen for a sonification of several data channels from set containing a recording of the neural activity of a person listening to a...
Hans Van Raaij