This paper investigates some modular powering functions suitable for cryptography. It is well known that the Rabin encryption function is a 4-to-1 mapping and breaking its one-wayn...
Cyberinfrastructures bring together distributed resources to support scientific discoveries. Cyberinfrastructures currently under development are intended to enable the cooperativ...
This paper discusses the concept of using head and facial feature tracking as an input mechanism for mobile devices. We present our concept and ideas, along with preliminary findi...
Kathryn Carnegie, Stuart Fleming, Esfandiar Ammira...
This paper describes the design and initial evaluation of Tag-liatelle, a collaborative tagging application for encouraging healthier eating. Users photograph their own meals and ...
Conor Linehan, Mark Doughty, Shaun Lawson, Ben Kir...
In developing High-Performance Computing (HPC) software, time to solution is an important metric. This metric is comprised of two main components: the human effort required develo...