Sciweavers

3134 search results - page 349 / 627
» Computing full disjunctions
Sort
View
WEA
2005
Springer
109views Algorithms» more  WEA 2005»
15 years 6 months ago
Synchronization Fault Cryptanalysis for Breaking A5/1
Abstract. A5/1 pseudo-random bit generator, known from GSM networks, potentially might be used for different purposes, such as secret hiding during cryptographic hardware testing, ...
Marcin Gomulkiewicz, Miroslaw Kutylowski, Heinrich...
107
Voted
DOLAP
2004
ACM
15 years 6 months ago
Aggregate queries in peer-to-peer OLAP
A peer-to-peer (P2P) data management system consists essentially of a network of peer systems, each maintaining full autonomy over its own data resources. Data exchange between pe...
Mauricio Minuto Espil, Alejandro A. Vaisman
74
Voted
IUI
2004
ACM
15 years 6 months ago
Handling device diversity through multi-level stylesheets
With the advent of in-home networking and ubiquitous computing, it becomes apparent that we have an increasing need for automatic adaptation of user interfaces to different device...
Walter Dees
110
Voted
MM
2004
ACM
174views Multimedia» more  MM 2004»
15 years 6 months ago
Speech, ink, and slides: the interaction of content channels
In this paper, we report on an empirical exploration of digital ink and speech usage in lecture presentation. We studied the video archives of five Master’s level Computer Scien...
Richard J. Anderson, Crystal Hoyer, Craig Prince, ...
UIST
2004
ACM
15 years 6 months ago
Visual tracking of bare fingers for interactive surfaces
Visual tracking of bare fingers allows more direct manipulation of digital objects, multiple simultaneous users interacting with their two hands, and permits the interaction on l...
Julien Letessier, François Bérard