Sciweavers

2059 search results - page 288 / 412
» New Advances in Reconfigurable Computing and its Application...
Sort
View
FSE
2009
Springer
136views Cryptology» more  FSE 2009»
16 years 9 days ago
MAC Reforgeability
Message Authentication Codes (MACs) are core algorithms deployed in virtually every security protocol in common usage. In these protocols, the integrity and authenticity of messag...
John Black, Martin Cochran
ICICS
2001
Springer
15 years 4 months ago
Enforcing Obligation with Security Monitors
With the ubiquitous deployment of large scale networks more and more complex human interactions are supported by computer applications. This poses new challenges on the expressive...
Carlos Ribeiro, Andre Zuquete, Paulo Ferreira
VISUALIZATION
1997
IEEE
15 years 4 months ago
A comparison of normal estimation schemes
The task of reconstructing the derivative of a discrete function is essential for its shading and rendering as well as being widely used in image processing and analysis. We surve...
Torsten Möller, Raghu Machiraju, Klaus Muelle...
ASSETS
2008
ACM
15 years 1 months ago
Technology for just-in-time in-situ learning of facial affect for persons diagnosed with an autism spectrum disorder
Many first-hand accounts from individuals diagnosed with autism spectrum disorders (ASD) highlight the challenges inherent in processing high-speed, complex, and unpredictable soc...
Miriam Madsen, Rana El Kaliouby, Matthew Goodwin, ...
IADIS
2004
15 years 1 months ago
Jill (Just-in-Location Learning)
Wireless technologies are poised to bring major changes in the information infrastructure, transforming communications and facilitating information retrieval. Over the next severa...
Joaquin Ruiz, Susan Wheeler