Sciweavers

113 search results - page 10 / 23
» A material history of bits
Sort
View
ACNS
2011
Springer
231views Cryptology» more  ACNS 2011»
14 years 1 months ago
Cold Boot Key Recovery by Solving Polynomial Systems with Noise
A method for extracting cryptographic key material from DRAM used in modern computers has been recently proposed in [9]; the technique was called Cold Boot attacks. When considerin...
Martin Albrecht, Carlos Cid
CORR
2010
Springer
144views Education» more  CORR 2010»
14 years 9 months ago
Adaptive Demodulation in Differentially Coherent Phase Systems: Design and Performance Analysis
Adaptive Demodulation (ADM) is a newly proposed rate-adaptive system which operates without requiring Channel State Information (CSI) at the transmitter (unlike adaptive modulatio...
J. David Brown, Jamshid Abouei, Konstantinos N. Pl...
VLDB
2002
ACM
116views Database» more  VLDB 2002»
14 years 9 months ago
Watermarking Relational Databases
We enunciate the need for watermarking database relations to deter their piracy, identify the unique characteristics of relational data which pose new challenges for watermarking,...
Rakesh Agrawal, Jerry Kiernan
CHI
2008
ACM
15 years 10 months ago
Increasing the utility of quantitative empirical studies for meta-analysis
Despite the long history and consistent use of quantitative empirical methods to evaluate information visualization techniques and systems, our understanding of interface use rema...
Heidi Lam, Tamara Munzner
CSCW
2010
ACM
15 years 6 months ago
Pictionaire: supporting collaborative design work by integrating physical and digital artifacts
This paper introduces an interactive tabletop system that enhances creative collaboration across physical and digital artifacts. Pictionaire offers capture, retrieval, annotation,...
Björn Hartmann, Meredith Ringel Morris, Hrvoj...