Sciweavers

5722 search results - page 322 / 1145
» Security Function Interactions
Sort
View
103
Voted
TEI
2010
ACM
115views Hardware» more  TEI 2010»
15 years 10 months ago
Electronic popables: exploring paper-based computing through an interactive pop-up book
We have developed an interactive pop-up book called Electronic Popables to explore paper-based computing. Our book integrates traditional pop-up mechanisms with thin, flexible, pa...
Jie Qi, Leah Buechley
127
Voted
ICRA
2008
IEEE
169views Robotics» more  ICRA 2008»
15 years 10 months ago
Sparse incremental learning for interactive robot control policy estimation
— We are interested in transferring control policies for arbitrary tasks from a human to a robot. Using interactive demonstration via teloperation as our transfer scenario, we ca...
Daniel H. Grollman, Odest Chadwicke Jenkins
129
Voted
TCC
2007
Springer
92views Cryptology» more  TCC 2007»
15 years 9 months ago
One-Way Permutations, Interactive Hashing and Statistically Hiding Commitments
We present a lower bound on the round complexity of a natural class of black-box constructions of statistically hiding commitments from one-way permutations. This implies a Ω( n ...
Hoeteck Wee
152
Voted
CSB
2005
IEEE
141views Bioinformatics» more  CSB 2005»
15 years 9 months ago
A Parallel Algorithm for Clustering Protein-Protein Interaction Networks
The increasing availability of interaction graphs requires new resource-efficient tools capable of extracting valuable biological knowledge from these networks. In this paper we ...
Qiaofeng Yang, Stefano Lonardi
134
Voted
ICECCS
2005
IEEE
87views Hardware» more  ICECCS 2005»
15 years 9 months ago
Modeling Diverse and Complex Interactions Enabled by Middleware as Connectors in Software Architectures
Middleware enables distributed components to interact with each others in diverse and complex manners. Such interactions should be modeled at architecture level for controlling th...
Yali Zhu