Sciweavers

20175 search results - page 5 / 4035
» Is abstraction the key to computing
Sort
View
93
Voted
SCALESPACE
2001
Springer
15 years 4 months ago
Morphological Tools for Robust Key-Region Extraction and Video Shot Modeling
Abstract. In recent years, the use of multimedia content has experienced an exponential growth. In this context, the need of new image/video sequence representation is becoming a n...
Javier Ruiz Hidalgo, Philippe Salembier
92
Voted
HAPTICS
2010
IEEE
15 years 4 months ago
The Core Skills Trainer: A Set of Haptic Games for Practicing Key Clinical Skills
Abstract. A new approach to teaching the skills used by health professionals during hands-on (palpation-based) examinations and procedures is reported, where students practice indi...
Sarah Baillie, Neil Forrest, Tierney Kinnison
95
Voted
CIS
2004
Springer
15 years 5 months ago
General Public Key m-Out-of-n Oblivious Transfer
Abstract. In the m-out-of-n oblivious transfer model, Alice has n messages, Bob has m choices. After the interaction between the two parties, Bob can get m but only m messages from...
Zhide Chen, Hong Zhu
PKC
2007
Springer
165views Cryptology» more  PKC 2007»
15 years 6 months ago
Deterministic Polynomial Time Equivalence Between Factoring and Key-Recovery Attack on Takagi's RSA
Abstract. For RSA, May showed a deterministic polynomial time equivalence of computing d to factoring N(= pq). On the other hand, Takagi showed a variant of RSA such that the decry...
Noboru Kunihiro, Kaoru Kurosawa
ASIACRYPT
2000
Springer
15 years 4 months ago
Key Improvements to XTR
Abstract. This paper describes improved methods for XTR key representation and parameter generation (cf. [4]). If the field characteristic is properly chosen, the size of the XTR ...
Arjen K. Lenstra, Eric R. Verheul