Sciweavers

12289 search results - page 374 / 2458
» computing 2006
Sort
View
136
Voted
CCS
2006
ACM
15 years 8 months ago
Daonity: grid security with behaviour conformity from trusted computing
A central security requirement for grid computing can be referred to as behaviour conformity. This is an assurance that ad hoc related principals (users, platforms or instruments)...
Wenbo Mao, Fei Yan, Chunrun Chen
147
Voted
EDUTAINMENT
2006
Springer
15 years 8 months ago
Trans-disciplinary Avenues in Education: Computing and Art
In this paper we report on an interdisciplinary course "Computing and Art" taught at the Sabanci University, Istanbul for the first time in fall of 2004. We also present...
Selim Balcisoy, Elif E. Ayiter
HCI
2007
15 years 6 months ago
A Note on Brain Actuated Spelling with the Berlin Brain-Computer Interface
Brain-Computer Interfaces (BCIs) are systems capable of decoding neural activity in real time, thereby allowing a computer application to be directly controlled by the brain. Since...
Benjamin Blankertz, Matthias Krauledat, Guido Dorn...
CSREASAM
2006
15 years 6 months ago
Finding Minimum Optimal Path Securely Using Homomorphic Encryption Schemes in Computer Networks
- In this paper we find a secure routing protocol for computer networks, which finds minimum optimum path using homomorphic encryption schemes. We briefly look into the existing ho...
Levent Ertaul, Vaidehi Kedlaya
122
Voted
BC
2006
80views more  BC 2006»
15 years 5 months ago
Sparse Spatial Sampling for the Computation of Motion in Multiple Stages
The avian retino-tecto-rotundal pathway plays a central role in motion analysis and features complex connectivity. Yet, the relation between the pathway's structural arrangeme...
Alireza S. Mahani, Reza Khanbabaie, Harald Luksch,...