Sciweavers

20175 search results - page 25 / 4035
» Is abstraction the key to computing
Sort
View
100
Voted
GW
2009
Springer
149views Biometrics» more  GW 2009»
14 years 10 months ago
Systematicity and Idiosyncrasy in Iconic Gesture Use: Empirical Analysis and Computational Modeling
Abstract. Why an iconic gesture takes its particular form is a largely open question, given the variations one finds across both situations and speakers. We present results of an e...
Kirsten Bergmann, Stefan Kopp
99
Voted
JUCS
2008
140views more  JUCS 2008»
15 years 13 days ago
The Computable Multi-Functions on Multi-represented Sets are Closed under Programming
: In the representation approach to computable analysis (TTE) [Grz55, i00], abstract data like rational numbers, real numbers, compact sets or continuous real functions are represe...
Klaus Weihrauch
101
Voted
FDTC
2006
Springer
102views Cryptology» more  FDTC 2006»
15 years 4 months ago
Cryptographic Key Reliable Lifetimes: Bounding the Risk of Key Exposure in the Presence of Faults
With physical attacks threatening the security of current cryptographic schemes, no security policy can be developed without taking into account the physical nature of computation....
Alfonso De Gregorio
107
Voted
CIS
2007
Springer
15 years 6 months ago
A New Provably Secure Authentication and Key Agreement Mechanism for SIP Using Certificateless Public-Key Cryptography
The session initiation protocol (SIP) is considered as the dominant signaling protocol for calls over the internet. However, SIP authentication typically uses HTTP digest authentic...
Fengjiao Wang, Yuqing Zhang