Sciweavers

21520 search results - page 55 / 4304
» Symmetric network computation
Sort
View
STOC
2009
ACM
145views Algorithms» more  STOC 2009»
15 years 10 months ago
Non-malleable extractors and symmetric key cryptography from weak secrets
We study the question of basing symmetric key cryptography on weak secrets. In this setting, Alice and Bob share an n-bit secret W, which might not be uniformly random, but the ad...
Yevgeniy Dodis, Daniel Wichs
CVPR
2007
IEEE
16 years 2 days ago
Symmetric Objects are Hardly Ambiguous
Given any two images taken under different illumination conditions, there always exist a physically realizable object which is consistent with both the images even if the lighting...
Gaurav Aggarwal, Soma Biswas, Rama Chellappa
CHI
2000
ACM
15 years 2 months ago
Symmetric bimanual interaction
We present experimental work that explores the factors governing symmetric bimanual interaction in a two-handed task that requires the user to track a pair of targets, one target ...
Ravin Balakrishnan, Ken Hinckley
SYMMETRY
2010
72views more  SYMMETRY 2010»
14 years 4 months ago
Symmetric Matrix Fields in the Finite Element Method
: The theory of elasticity is used to predict the response of a material body subject to applied forces. In the linear theory, where the displacement is small, the stress tensor wh...
Gerard Awanou
ISCC
2003
IEEE
140views Communications» more  ISCC 2003»
15 years 3 months ago
A Low-Energy Key Management Protocol for Wireless Sensor Networks
Sensor networks have recently gained popularity for a wide spectrum of applications. When performing monitoring tasks in hostile environments, security requirements become critical...
Gaurav Jolly, Mustafa C. Kusçu, Pallavi Kok...