Sciweavers

132
Voted
JOCN
2011
117views more  JOCN 2011»
14 years 6 months ago
Identifying the What, Why, and How of an Observed Action: An fMRI Study of Mentalizing and Mechanizing during Action Observation
■ Humans commonly understand the unobservable mental states of others by observing their actions. Embodied simulation theories suggest that this ability may be based in areas of...
Robert P. Spunt, Ajay B. Satpute, Matthew D. Liebe...
JOCN
2011
100views more  JOCN 2011»
14 years 6 months ago
The Emergence of Perceived Position in the Visual System
■ Representing object position is one of the most critical functions of the visual system, but this task is not as simple as reading off an objectʼs retinal coordinates. A rich...
Jason Fischer, Nicole Spotswood, David Whitney
125
Voted
JOC
2011
79views more  JOC 2011»
14 years 6 months ago
Tweakable Block Ciphers
We propose a new cryptographic primitive, the “tweakable block cipher.” Such a cipher has not only the usual inputs—message and cryptographic key—but also a third input, th...
Moses Liskov, Ronald L. Rivest, David Wagner
138
Voted
JOC
2011
104views more  JOC 2011»
14 years 6 months ago
On the Security of Oscillator-Based Random Number Generators
Physical random number generators (a.k.a. TRNGs) appear to be critical components of many cryptographic systems. Yet, such building blocks are still too seldom provided with a form...
Mathieu Baudet, David Lubicz, Julien Micolod, Andr...
134
Voted
JOC
2011
104views more  JOC 2011»
14 years 6 months ago
Short Undeniable Signatures Based on Group Homomorphisms
This paper is devoted to the design and analysis of short undeniable signatures based on a random oracle. Exploiting their online property, we can achieve signatures with a fully s...
Jean Monnerat, Serge Vaudenay
132
Voted
JOC
2011
94views more  JOC 2011»
14 years 6 months ago
Mutual Information Analysis: a Comprehensive Study
Mutual Information Analysis is a generic side-channel distinguisher that has been introduced at CHES 2008. It aims to allow successful attacks requiring minimum assumptions and kno...
Lejla Batina, Benedikt Gierlichs, Emmanuel Prouff,...
334
Voted
JNCA
2011
281views more  JNCA 2011»
14 years 6 months ago
A link stability-based multicast routing protocol for wireless mobile ad hoc networks
  Recently, several studies have been conducted to design mobility‐based multicast routing protocols for    wireless mobile ad hoc networks (MANET). These ...
Javad Akbari Torkestani, Mohammad Reza Meybodi
142
Voted
JNCA
2011
102views more  JNCA 2011»
14 years 6 months ago
Multi-objective zone mapping in large-scale distributed virtual environments
In large-scale distributed virtual environments (DVEs), the NP-hard zone mapping problem concerns how to assign distinct zones of the virtual world to a number of distributed serv...
Ta Nguyen Binh Duong, Suiping Zhou, Wentong Cai, X...
97
Voted
JMIS
2011
66views more  JMIS 2011»
14 years 6 months ago
Drivers of the Long Tail Phenomenon: An Empirical Analysis
: The Internet makes it easy to offer large assortments of products, tempting managers to chase the “long tail”—that is, the phenomenon in which niche products gain a signifi...
Oliver Hinz, Jochen Eckert, Bernd Skiera