Sciweavers

2399 search results - page 150 / 480
» On Authentication between Human and Computer
Sort
View
146
Voted
COMPGEOM
2001
ACM
15 years 7 months ago
Computational geometry for sculpture
This presentation illustrates examples of my geometric sculpture and outlines certain design techniques. I apply methods from the field of computational geometry to the creation o...
George W. Hart
ISCAPDCS
2004
15 years 5 months ago
Fractal Computation in Step with Real-Time Dance
This paper describes a collaboration among computer scientists, dancers, and musicians on a production entitled "Fibonacci and Phi." Thematically, the production explore...
Jennifer J. Burg, Tim Miller
FOCS
2007
IEEE
15 years 10 months ago
Lower Bounds on Signatures From Symmetric Primitives
We show that every construction of one-time signature schemes from a random oracle achieves black-box security at most 2(1+o(1))q , where q is the total number of oracle queries a...
Boaz Barak, Mohammad Mahmoody-Ghidary
CSIE
2009
IEEE
15 years 8 months ago
Flash-Based Tool for Earthquake Epicenter Identification
Previously, the methods used by scientists to locate an earthquake epicenter were so cumbersome, even for scientists, that the epicenter location methodology needed to be simplifi...
Youwen Ouyang, Matthew Lehmann, Katherine Hayden, ...
140
Voted
ACMICEC
2007
ACM
163views ECommerce» more  ACMICEC 2007»
15 years 8 months ago
Digital rights management using a mobile phone
This paper focuses on the problem of preventing illegal copying of digital assets without jeopardising the right of legitimate licence holders to transfer content between their ow...
Imad M. Abbadi, Chris J. Mitchell