Sciweavers

4511 search results - page 625 / 903
» Observation Based System Security
Sort
View
ICISC
2004
96views Cryptology» more  ICISC 2004»
15 years 5 months ago
Efficient Broadcast Encryption Using Multiple Interpolation Methods
We propose a new broadcast encryption scheme based on polynomial interpolations. Our scheme, obtained from the Naor-Pinkas scheme by partitioning the user set and interpolating mul...
Eun Sun Yoo, Nam-Su Jho, Jung Hee Cheon, Myung-Hwa...
MICCAI
2004
Springer
16 years 5 months ago
A Collaborative Virtual Environment for the Simulation of Temporal Bone Surgery
Abstract. We describe a framework for training-oriented simulation of temporal bone surgery. Bone dissection is simulated visually and haptically, using a hybrid data representatio...
Dan Morris, Christopher Sewell, Nikolas H. Blevins...
CHI
2009
ACM
16 years 4 months ago
Dynamic mapping of physical controls for tabletop groupware
Multi-touch interactions are a promising means of control for interactive tabletops. However, a lack of precision and tactile feedback makes multi-touch controls a poor fit for ta...
Rebecca Fiebrink, Dan Morris, Meredith Ringel Morr...
CC
2010
Springer
172views System Software» more  CC 2010»
15 years 11 months ago
Verifying Local Transformations on Relaxed Memory Models
The problem of locally transforming or translating programs without altering their semantics is central to the construction of correct compilers. For concurrent shared-memory progr...
Sebastian Burckhardt, Madanlal Musuvathi, Vasu Sin...
ISBI
2009
IEEE
15 years 11 months ago
Steerable Filters for Orientation Estimation and Localization of Fluorescent Dipoles
Fluorescence localization microscopy (i.e., PALM, STORM) has enabled optical imaging at nanometer-scale resolutions. The localization algorithms used in these techniques rely on ï...
François Aguet, Stefan Geissbühler, Iw...