Sciweavers

3555 search results - page 518 / 711
» Security-Critical System Development with Extended Use Cases
Sort
View
WWW
2005
ACM
16 years 5 months ago
Named graphs, provenance and trust
The Semantic Web consists of many RDF graphs nameable by URIs. This paper extends the syntax and semantics of RDF to cover such Named Graphs. This enables RDF statements that desc...
Jeremy J. Carroll, Christian Bizer, Patrick J. Hay...
CHES
2009
Springer
230views Cryptology» more  CHES 2009»
16 years 4 months ago
Designing an ASIP for Cryptographic Pairings over Barreto-Naehrig Curves
Abstract. This paper presents a design-space exploration of an applicationspecific instruction-set processor (ASIP) for the computation of various cryptographic pairings over Barre...
David Kammler, Diandian Zhang, Dominik Auras, Gerd...
CHI
2010
ACM
15 years 11 months ago
Deception and magic in collaborative interaction
We explore the ways in which interfaces can be designed to deceive users so as to create the illusion of magic. We present a study of an experimental performance in which a magici...
Joe Marshall, Steve Benford, Tony P. Pridmore
VRML
2009
ACM
15 years 10 months ago
Interactive stories on the net: a model and an architecture for X3D worlds
This work discusses a model and an architecture for interactive stories to be displayed on the net, designed for being independent from the specific story represented and suitabl...
Efrem Carnielli, Fabio Pittarello
ICASSP
2008
IEEE
15 years 10 months ago
Adaptive short-time analysis-synthesis for speech enhancement
In this paper we present a new adaptive short-time Fourier analysissynthesis scheme and demonstrate its efficacy in speech enhancement. While a number of adaptive analyses have p...
Daniel Rudoy, Prabahan Basu, Thomas F. Quatieri, B...