Sciweavers

3938 search results - page 634 / 788
» Interactive Protocols on the Reals
Sort
View
CRYPTO
2011
Springer
237views Cryptology» more  CRYPTO 2011»
13 years 10 months ago
Bi-Deniable Public-Key Encryption
In CRYPTO 1997, Canetti et al.put forward the intruiging notion of deniable encryption, which (informally) allows a sender and/or receiver, having already performed some encrypted...
Adam O'Neill, Chris Peikert, Brent Waters
IPMI
2001
Springer
15 years 11 months ago
An Adaptive Level Set Method for Medical Image Segmentation
An efficient adaptive multigrid level set method for front propagation purposes in three dimensional medical image processing and segmentation is presented. It is able to deal with...
Marc Droske, Bernhard Meyer, Martin Rumpf, Carlo S...
CHI
2009
ACM
15 years 10 months ago
Aurally and visually enhanced audio search with soundtorch
Finding a specific or an artistically appropriate sound in a vast collection comprising thousands of audio files containing recordings of, say, footsteps, gunshots, and thundercla...
Sebastian Heise, Michael Hlatky, Jörn Lovisca...
63
Voted
CHI
2008
ACM
15 years 10 months ago
Activity-based prototyping of ubicomp applications for long-lived, everyday human activities
We designed an activity-based prototyping process realized in the ActivityDesigner system that combines the theoretical framework of Activity-Centered Design with traditional iter...
Yang Li, James A. Landay
CHI
2003
ACM
15 years 10 months ago
Hardware companions?: what online AIBO discussion forums reveal about the human-robotic relationship
In this study, we investigated people's relationships with AIBO, a robotic pet, through 6,438 spontaneous postings in online AIBO discussion forums. Results showed that AIBO ...
Batya Friedman, Peter H. Kahn Jr., Jennifer Hagman