Sciweavers

8655 search results - page 341 / 1731
» Challenges for Trusted Computing
Sort
View
PROCEDIA
2010
154views more  PROCEDIA 2010»
14 years 10 months ago
Parallel computation of phylogenetic consensus trees
The field of bioinformatics is witnessing a rapid and overwhelming accumulation of molecular sequence data, predominantly driven by novel wet-lab sequencing techniques. This trend...
Andre J. Aberer, Nicholas D. Pattengale, Alexandro...
IACR
2011
88views more  IACR 2011»
14 years 3 months ago
Targeted Malleability: Homomorphic Encryption for Restricted Computations
We put forward the notion of targeted malleability: given a homomorphic encryption scheme, in various scenarios we would like to restrict the homomorphic computations one can perf...
Dan Boneh, Gil Segev, Brent Waters
IVA
2009
Springer
15 years 10 months ago
Teaching Computers to Conduct Spoken Interviews: Breaking the Realtime Barrier with Learning
Abstract. Several challenges remain in the effort to build software capable of conducting realtime dialogue with people. Part of the problem has been a lack of realtime flexibili...
Gudny Ragna Jonsdottir, Kristinn R. Thóriss...
136
Voted
UML
2005
Springer
15 years 9 months ago
Capturing Common and Variable Design Aspects for Ubiquitous Computing with MB-UID
Developing user interfaces for ubiquitous environments is a challenging task. In such an environment, users can apply different devices to accomplish the same or different tasks. ...
Alexander Boedcher, Kizito Mukasa, Detlef Zuelke
CRV
2009
IEEE
132views Robotics» more  CRV 2009»
15 years 8 months ago
Canine Pose Estimation: A Computing for Public Safety Solution
In this paper we discuss determining canine pose in the context of common poses observed in Urban Search and Rescue dogs through the use a sensor network made up of accelerometers...
Cristina Ribeiro, Alexander Ferworn, Mieso K. Denk...