Sciweavers

1575 search results - page 45 / 315
» The provenance of electronic data
Sort
View
CONEXT
2008
ACM
14 years 11 months ago
Packet-dropping adversary identification for data plane security
Until recently, the design of packet dropping adversary identification protocols that are robust to both benign packet loss and malicious behavior has proven to be surprisingly el...
Xin Zhang, Abhishek Jain 0002, Adrian Perrig
CCS
2005
ACM
15 years 3 months ago
Applications of secure electronic voting to automated privacy-preserving troubleshooting
Recent work [27, 15] introduced a novel peer-to-peer application that leverages content sharing and aggregation among the peers to diagnose misconfigurations on a desktop PC. Thi...
Qiang Huang, David Jao, Helen J. Wang
NIME
2005
Springer
167views Music» more  NIME 2005»
15 years 3 months ago
Beat Boxing: Expressive Control for Electronic Music Performance and Musical Applications
This paper describes the design and implementation of Beat Boxing, a percussive gestural interface for the live performance of electronic music and control of computerbased games ...
Damondrick Jack, Robert Lugo
NIME
2004
Springer
122views Music» more  NIME 2004»
15 years 3 months ago
The Stranglophone: Enhancing Expressiveness in Live Electronic Music
This paper describes the design and on-going development of an expressive gestural MIDI interface and how this could enhance live performance of electronic music. Keywords gestura...
Michael Eyal Sharon
ICAIL
2005
ACM
15 years 3 months ago
Computational Law
Computational law is an approach to automated legal reasoning focusing on semantically rich laws, regulations, contract terms, and business rules in the context of electronicallym...
Nathaniel Love, Michael R. Genesereth