Sciweavers

692 search results - page 59 / 139
» Some research questions for computational transportation sci...
Sort
View
TCC
2009
Springer
146views Cryptology» more  TCC 2009»
15 years 10 months ago
An Optimally Fair Coin Toss
We address one of the foundational problems in cryptography: the bias of coin-flipping protocols. Coin-flipping protocols allow mutually distrustful parties to generate a common u...
Tal Moran, Moni Naor, Gil Segev
TAPIA
2005
ACM
15 years 3 months ago
Towards a cross-platform microbenchmark suite for evaluating hardware performance counter data
As useful as performance counters are, the meaning of reported aggregate event counts is sometimes questionable. Questions arise due to unanticipated processor behavior, overhead ...
Roberto Araiza, Maria Gabriela Aguilera, Thientam ...
CHI
2005
ACM
15 years 10 months ago
Why CHI fragmented
I have been active in SIGCHI since 1983, serving on the Executive Committee and many conference and program committees. After editing ACM TOCHI for six years, I explored the histo...
Jonathan Grudin
IJNSEC
2007
161views more  IJNSEC 2007»
14 years 10 months ago
Data Hiding: Current Status and Key Issues
Image steganography is a covert communication method that uses an image as the cover to hide the truth from potential attackers that some secret message hidden in the image is bei...
Nan-I Wu, Min-Shiang Hwang
WSC
2004
14 years 11 months ago
IAGO Project and Development of Compound Agents
The IAGO Project explores the question of whether a software model, in the form of a computational model of cognitive behavior, can contribute to better anticipation of asymmetric...
John E. Hiles