Sciweavers

1396 search results - page 193 / 280
» aim 2006
Sort
View
134
Voted
MMSEC
2006
ACM
132views Multimedia» more  MMSEC 2006»
15 years 6 months ago
On achievable security levels for lattice data hiding in the known message attack scenario
This paper presents a theoretical security analysis of lattice data hiding. The security depends on the secrecy of a dither signal that randomizes the codebook. If the same secret...
Luis Pérez-Freire, Fernando Pérez-Go...
126
Voted
MOMM
2006
ACM
168views Communications» more  MOMM 2006»
15 years 6 months ago
Mobile P2P Web Service Creation using SIP
: Telecommunication networks and the Internet are growing together. Peer-to-Peer (P2P) services which are originally offered by network providers, like telephony and messaging, ar...
Guido Gehlen, Fahad Aijaz, Yi Zhu, Bernhard Walke
NORDICHI
2006
ACM
15 years 6 months ago
Crossmodal spatial location: initial experiments
This paper describes an alternative form of interaction for mobile devices using crossmodal output. The aim of our work is to investigate the equivalence of audio and tactile disp...
Eve E. Hoggan, Stephen A. Brewster
88
Voted
NORDICHI
2006
ACM
15 years 6 months ago
Systematic evaluation of e-learning systems: an experimental validation
The evaluation of e-learning applications deserves special attention and evaluators need effective methodologies and appropriate guidelines to perform their task. We have proposed...
Carmelo Ardito, Maria Francesca Costabile, Antonel...
85
Voted
NORDICHI
2006
ACM
15 years 6 months ago
Augmenting refrigerator magnets: why less is sometimes more
In this paper we present a number of augmented refrigerator magnet concepts. The concepts are shown to be derived from previous research into the everyday use of fridge surfaces. ...
Alex S. Taylor, Laurel Swan, Rachel Eardley, Abiga...