Sciweavers

25111 search results - page 5018 / 5023
» Information Systems
Sort
View
CRYPTO
2011
Springer
237views Cryptology» more  CRYPTO 2011»
13 years 9 months ago
Bi-Deniable Public-Key Encryption
In CRYPTO 1997, Canetti et al.put forward the intruiging notion of deniable encryption, which (informally) allows a sender and/or receiver, having already performed some encrypted...
Adam O'Neill, Chris Peikert, Brent Waters
DAC
2011
ACM
13 years 9 months ago
Supervised design space exploration by compositional approximation of Pareto sets
Technology scaling allows the integration of billions of transistors on the same die but CAD tools struggle in keeping up with the increasing design complexity. Design productivit...
Hung-Yi Liu, Ilias Diakonikolas, Michele Petracca,...
81
Voted
IACR
2011
89views more  IACR 2011»
13 years 9 months ago
Identity-Based Decryption
Identity-based decryption is an alternative to identity-based encryption, in which Alice encrypts a symmetric key for Bob under a trusted authority’s public key. Alice sends Bob...
Daniel R. L. Brown
165
Voted
IHI
2012
291views Healthcare» more  IHI 2012»
13 years 5 months ago
PANI: an interactive data-driven tool for target prioritization in signaling networks
Biological network analysis often aims at the target identification problem, which is to predict which molecule to inhibit (or activate) for a disease treatment to achieve optimu...
Huey-Eng Chua, Sourav S. Bhowmick, Lisa Tucker-Kel...
94
Voted
TEI
2012
ACM
258views Hardware» more  TEI 2012»
13 years 5 months ago
The HapticTouch toolkit: enabling exploration of haptic interactions
In the real world, touch based interaction relies on haptic feedback (e.g., grasping objects, feeling textures). Unfortunately, such feedback is absent in current tabletop systems...
David Ledo, Miguel A. Nacenta, Nicolai Marquardt, ...
« Prev « First page 5018 / 5023 Last » Next »