Sciweavers

7596 search results - page 241 / 1520
» Challenges in forensic computing
Sort
View
CHI
2003
ACM
16 years 4 months ago
An interactive poster exhibit puts visitors in the picture, in real time
This describes the usability and interaction challenges in creating a unique museum exhibit which utilized real-time compositing, and sought to hide complex computational and netw...
Kevin Walker
PKC
1999
Springer
94views Cryptology» more  PKC 1999»
15 years 8 months ago
Low-Cost Double-Size Modular Exponentiation or How to Stretch Your Cryptoprocessor
Public-key implementers often face strong hardware-related constraints. In particular, modular operations required in most cryptosystems generally constitute a computational bottle...
Pascal Paillier
PERCOM
2006
ACM
16 years 4 months ago
YA-TRAP: Yet Another Trivial RFID Authentication Protocol
Security and privacy in RFID systems is an important and active research area. A number of challenges arise due to the extremely limited computational, storage and communication a...
Gene Tsudik
CVIU
2007
108views more  CVIU 2007»
15 years 4 months ago
Multimodal human-computer interaction: A survey
Abstract. In this paper we review the major approaches to multimodal human computer interaction from a computer vision perspective. In particular, we focus on body, gesture, gaze, ...
Alejandro Jaimes, Nicu Sebe
JETAI
2007
143views more  JETAI 2007»
15 years 4 months ago
The importance of cognitive architectures: an analysis based on CLARION
Research in computational cognitive modeling investigates the nature of cognition through developing process-based understanding by specifying computational models of mechanisms (...
Ron Sun