Sciweavers

783 search results - page 65 / 157
» Bridging the Gaps
Sort
View
150
Voted
FORTE
2009
14 years 10 months ago
Epistemic Logic for the Applied Pi Calculus
We propose an epistemic logic for the applied pi calculus, which is a variant of the pi calculus with extensions for modeling cryptographic protocols. In such a calculus, the secur...
Rohit Chadha, Stéphanie Delaune, Steve Krem...
97
Voted
HCI
2009
14 years 10 months ago
TACTUS: A Hardware and Software Testbed for Research in Multi-Touch Interaction
This paper presents the TACTUS Multi-Touch Research Testbed, a hardware and software system for enabling research in multi-touch interaction. A detailed discussion is provided on h...
Paul Varcholik, Joseph J. LaViola Jr., Denise M. N...
127
Voted
ICUMT
2009
14 years 10 months ago
Extending middleware frameworks for Wireless Sensor Networks
We define sensor middleware as the binding code mainly running between the sensor OS and applications g programming abstractions to bridge the gap between application developers an...
Syed Rehan Afzal, Christophe Huygens, Wouter Joose...
FLAIRS
2011
14 years 4 months ago
No Peanuts! Affective Cues for the Virtual Bartender
The aim of this paper is threefold: it explores methods for the detection of affective states in text, it presents the usage of such affective cues in a conversational system and ...
Marcin Skowron, Hannes Pirker, Stefan Rank, Georgi...
IACR
2011
166views more  IACR 2011»
14 years 10 days ago
Bicliques for Preimages: Attacks on Skein-512 and the SHA-2 family
We introduce a new concept in splice-and-cut attacks on hash functions, which bridges the gap between preimage attacks and a powerful method of differential cryptanalysis. The ne...
Dmitry Khovratovich, Christian Rechberger, Alexand...