Sciweavers

7821 search results - page 1509 / 1565
» Nested Ordered Sets and their Use for Data Modelling
Sort
View
ICB
2007
Springer
156views Biometrics» more  ICB 2007»
15 years 6 months ago
Robust Extraction of Secret Bits from Minutiae
Abstract. Our goal is to extract consistent bits from the same fingerprint in a noisy environment. Such bits can then be used as a secret key in several cryptographic applications...
Ee-Chien Chang, Sujoy Roy
145
Voted
CSCW
2004
ACM
15 years 6 months ago
Territoriality in collaborative tabletop workspaces
Researchers seeking alternatives to traditional desktop computers have begun exploring the potential collaborative benefits of digital tabletop displays. However, there are still ...
Stacey D. Scott, M. Sheelagh T. Carpendale, Kori M...
EUROCRYPT
2010
Springer
15 years 5 months ago
Adaptively Secure Broadcast
A broadcast protocol allows a sender to distribute a message through a point-to-point network to a set of parties, such that (i) all parties receive the same message, even if the s...
Martin Hirt, Vassilis Zikas
117
Voted
IPPS
1998
IEEE
15 years 4 months ago
Prioritized Token-Based Mutual Exclusion for Distributed Systems
A number of solutions have been proposed for the problem of mutual exclusion in distributed systems. Some of these approaches have since been extended to a prioritized environment...
Frank Mueller
SIGGRAPH
1997
ACM
15 years 4 months ago
Metropolis light transport
We present a new Monte Carlo method for solving the light transport problem, inspired by the Metropolis sampling method in computational physics. To render an image, we generate a...
Eric Veach, Leonidas J. Guibas
« Prev « First page 1509 / 1565 Last » Next »