Sciweavers

6300 search results - page 917 / 1260
» We have it easy, but do we have it right
Sort
View
DAC
2009
ACM
15 years 6 months ago
Xquasher: a tool for efficient computation of multiple linear expressions
— Digital signal processing applications often require the computation of linear systems. These computations can be considerably expensive and require optimizations for lower pow...
Arash Arfaee, Ali Irturk, Nikolay Laptev, Farzan F...
107
Voted
HUC
2009
Springer
15 years 6 months ago
Understanding file access mechanisms for embedded Ubicomp collaboration interfaces
This paper explores the nature of interfaces to support people in accessing their files at tabletop displays embedded in the environment. To do this, we designed a study comparin...
Anthony Collins, Anastasia Bezerianos, Gregor McEw...
ASIACRYPT
2001
Springer
15 years 6 months ago
Threshold Cryptosystems Secure against Chosen-Ciphertext Attacks
Abstract. Semantic security against chosen-ciphertext attacks (INDCCA) is widely believed as the correct security level for public-key encryption scheme. On the other hand, it is o...
Pierre-Alain Fouque, David Pointcheval
118
Voted
CRYPTO
2001
Springer
153views Cryptology» more  CRYPTO 2001»
15 years 6 months ago
Universally Composable Commitments
d Abstract) Ran Canetti and Marc Fischlin Abstract. We propose a new security measure for commitment protocols, called Universally Composable (UC) Commitment. The measure guarantee...
Ran Canetti, Marc Fischlin
84
Voted
IUI
2000
ACM
15 years 6 months ago
SUITOR: an attentive information system
Attentive systems pay attention to what users do so that they can attend to what users need. Such systems track user behavior, model user interests, and anticipate user desires an...
Paul P. Maglio, Rob Barrett, Christopher S. Campbe...