Sciweavers

3544 search results - page 694 / 709
» Information Security in Open Systems
Sort
View
IV
2007
IEEE
157views Visualization» more  IV 2007»
15 years 4 months ago
Haptic Gaze-Tracking Based Perception of Graphical User Interfaces
This paper presents a novel human-computer interface that enables the computer display to be perceived without any use of the eyes. Our system works by tracking the user’s head ...
Simon Meers, Koren Ward
SPAA
2006
ACM
15 years 4 months ago
A performance analysis of local synchronization
Synchronization is often necessary in parallel computing, but it can create delays whenever the receiving processor is idle, waiting for the information to arrive. This is especia...
Julia Lipman, Quentin F. Stout
EUROCRYPT
2004
Springer
15 years 3 months ago
Positive Results and Techniques for Obfuscation
Informally, an obfuscator O is an efficient, probabilistic “compiler” that transforms a program P into a new program O(P) with the same functionality as P, but such that O(P)...
Ben Lynn, Manoj Prabhakaran, Amit Sahai
90
Voted
HICSS
2003
IEEE
143views Biometrics» more  HICSS 2003»
15 years 3 months ago
Formation, Routing, and Maintenance Protocols for the BlueRing Scatternet of Bluetooths
The basic networking unit in Bluetooth is piconet, and a larger-area Bluetooth network can be formed by multiple piconets, called scatternet. However, the structure of scatternets...
Ting-Yu Lin, Yu-Chee Tseng, Keng-Ming Chang, Chun-...
SIGECOM
2003
ACM
128views ECommerce» more  SIGECOM 2003»
15 years 3 months ago
A reputation-based trust model for peer-to-peer ecommerce communities
Peer-to-Peer eCommerce communities are commonly perceived as an environment offering both opportunities and threats. One way to minimize threats in such an open community is to us...
Li Xiong, Ling Liu