Sciweavers

6409 search results - page 1116 / 1282
» A Computational Algorithm for Origami Design
Sort
View
WPES
2004
ACM
15 years 7 months ago
Privacy management for portable recording devices
The growing popularity of inexpensive, portable recording devices, such as cellular phone cameras and compact digital audio recorders, presents a significant new threat to privac...
J. Alex Halderman, Brent R. Waters, Edward W. Felt...
122
Voted
ESORICS
2004
Springer
15 years 7 months ago
On the Role of Key Schedules in Attacks on Iterated Ciphers
This paper considers iterated ciphers and their resistance against linear and differential cryptanalysis. In the theory of these attacks one assumes independence of the round keys...
Lars R. Knudsen, John Erik Mathiassen
FPL
2004
Springer
109views Hardware» more  FPL 2004»
15 years 7 months ago
Hardware Accelerated Novel Protein Identification
The proteins in living organisms perform almost every significant function that governs life. A protein's functionality depends upon its physical structure, which depends on i...
Anish Alex, Jonathan Rose, Ruth Isserlin-Weinberge...
165
Voted
ICMI
2004
Springer
281views Biometrics» more  ICMI 2004»
15 years 7 months ago
Articulatory features for robust visual speech recognition
Visual information has been shown to improve the performance of speech recognition systems in noisy acoustic environments. However, most audio-visual speech recognizers rely on a ...
Kate Saenko, Trevor Darrell, James R. Glass
122
Voted
POLICY
2004
Springer
15 years 7 months ago
Responding to Policies at Runtime in TrustBuilder
Automated trust negotiation is the process of establishing trust between entities with no prior relationship through the iterative disclosure of digital credentials. One approach ...
Bryan Smith, Kent E. Seamons, Michael D. Jones
« Prev « First page 1116 / 1282 Last » Next »