Sciweavers

1546 search results - page 128 / 310
» Context-Aware Computing with Sound
Sort
View
145
Voted
ASIACRYPT
2003
Springer
15 years 10 months ago
On Class Group Computations Using the Number Field Sieve
The best practical algorithm for class group computations in imaginary quadratic number fields (such as group structure, class number, discrete logarithm computations) is a varian...
Mark L. Bauer, Safuat Hamdy
ASIAN
2007
Springer
126views Algorithms» more  ASIAN 2007»
15 years 11 months ago
Computational Semantics for Basic Protocol Logic - A Stochastic Approach
Abstract. This paper is concerned about relating formal and computational models of cryptography in case of active adversaries when formal security analysis is done with first ord...
Gergei Bana, Koji Hasebe, Mitsuhiro Okada
MM
2006
ACM
127views Multimedia» more  MM 2006»
15 years 11 months ago
The computational extraction of temporal formal structures in the interactive dance work '22'
In this paper we propose a framework for the computational extraction of time characteristics of a single choreographic work. Computational frameworks can aid in revealing nonsali...
Vidyarani M. Dyaberi, Hari Sundaram, Thanassis Rik...
WWW
2008
ACM
16 years 5 months ago
Webanywhere: enabling a screen reading interface for the web on any computer
People often use computers other than their own to access web content, but blind users are restricted to using computers equipped with expensive, special-purpose screen reading pr...
Jeffrey P. Bigham, Craig Prince, Richard E. Ladner
159
Voted
CRYPTO
2003
Springer
109views Cryptology» more  CRYPTO 2003»
15 years 10 months ago
Weak Key Authenticity and the Computational Completeness of Formal Encryption
Abstract. A significant effort has recently been made to rigorously relate the formal treatment of cryptography with the computational one. A first substantial step in this dire...
Omer Horvitz, Virgil D. Gligor