Sciweavers

669 search results - page 81 / 134
» Mastering the Master Theorem
Sort
View
PKC
2009
Springer
240views Cryptology» more  PKC 2009»
15 years 10 months ago
Distributed Public-Key Cryptography from Weak Secrets
Abstract.We introduce the notion of distributed password-based publickey cryptography, where a virtual high-entropy private key is implicitly dened as a concatenation of low-entrop...
Céline Chevalier, David Pointcheval, Michel...
CHI
2007
ACM
15 years 10 months ago
Approaches to web search and navigation for older computer novices
: A proof of concept web search and navigation system was developed for older people for whom the Internet is seen as an alien territory. A joint industry/academia team deployed Us...
Anna Dickinson, Michael J. Smith, John L. Arnott, ...
CHI
2002
ACM
15 years 10 months ago
The sound of one hand: a wrist-mounted bio-acoustic fingertip gesture interface
Two hundred and fifty years ago the Japanese Zen master Hakuin asked the question, "What is the Sound of the Single Hand?" This koan has long served as an aid to meditat...
Brian Amento, William C. Hill, Loren G. Terveen
RECOMB
2004
Springer
15 years 10 months ago
Using motion planning to study RNA folding kinetics
We propose a novel, motion planning based approach to approximately map the energy landscape of an RNA molecule. Our method is based on the successful probabilistic roadmap motion...
Xinyu Tang, Bonnie Kirkpatrick, Shawna L. Thomas, ...
RECOMB
2001
Springer
15 years 10 months ago
Geometric algorithms for the analysis of 2D-electrophoresis gels
In proteomics 2?dimensional gel electrophoresis (2?DE) is a separation technique for proteins. The resulting protein spots can be identified by either using picking robots and sub...
Alon Efrat, Frank Hoffmann, Klaus Kriegel, Christo...