Sciweavers

4411 search results - page 830 / 883
» Communication Complexity and Its Applications
Sort
View
136
Voted
SPAA
2010
ACM
15 years 9 months ago
Securing every bit: authenticated broadcast in radio networks
This paper studies non-cryptographic authenticated broadcast in radio networks subject to malicious failures. We introduce two protocols that address this problem. The first, Nei...
Dan Alistarh, Seth Gilbert, Rachid Guerraoui, Zark...
149
Voted
CRYPTO
2001
Springer
152views Cryptology» more  CRYPTO 2001»
15 years 9 months ago
Secure Distributed Linear Algebra in a Constant Number of Rounds
Consider a network of processors among which elements in a finite field K can be verifiably shared in a constant number of rounds. Assume furthermore constant-round protocols ar...
Ronald Cramer, Ivan Damgård
CA
1998
IEEE
15 years 8 months ago
Real-Time Facial Animation based upon a Bank of 3D Facial Expressions
The importance of faces in human interaction explains the desire for synthetic faces as a communication vehicle in computer graphics. Unfortunately, animating a face is a very com...
C. Kouadio, Pierre Poulin, P. Lachapelle
CHI
1998
ACM
15 years 8 months ago
Triangles: Tangible Interface for Manipulation and Exploration of Digital Information Topography
This paper presents a system for interacting with digital information, called Triangles. The Triangles system is a physical/digital construction kit, which allows users to use two...
Matthew G. Gorbet, Maggie Orth, Hiroshi Ishii
DMSN
2007
ACM
15 years 8 months ago
SenseSwarm: a perimeter-based data acquisition framework for mobile sensor networks
This paper assumes a set of n mobile sensors that move in the Euclidean plane as a swarm1 . Our objectives are to explore a given geographic region by detecting and aggregating sp...
Demetrios Zeinalipour-Yazti, Panayiotis Andreou, P...