Sciweavers

872 search results - page 19 / 175
» A Leakage-Resilient Mode of Operation
Sort
View
HOTOS
2003
IEEE
14 years 24 days ago
Cosy: Develop in User-Land, Run in Kernel-Mode
User applications that move a lot of data across the user-kernel boundary suffer from a serious performance penalty. We provide a framework, Compound System Calls (CoSy), to enhan...
Amit Purohit, Charles P. Wright, Joseph Spadavecch...
NIPS
2004
13 years 9 months ago
Edge of Chaos Computation in Mixed-Mode VLSI - A Hard Liquid
Computation without stable states is a computing paradigm different from Turing's and has been demonstrated for various types of simulated neural networks. This publication t...
Felix Schürmann, Karlheinz Meier, Johannes Sc...
HCI
2001
13 years 9 months ago
Issues in the combination of visual and haptic interaction
This paper discusses possibilities and problems arising in the design of usable interactive systems when both visual and haptic interaction modes are available. Communicational an...
Monica Bordegoni, Umberto Cugini, Piero Mussio
ICIA
2007
13 years 9 months ago
Intent Recognition for Human-Robot Interaction
Effective human-robot cooperation requires robotic devices that understand human goals and intentions. We frame the problem of intent recognition as one of tracking and predicting...
Andreas G. Hofmann, Brian C. Williams
ICISS
2009
Springer
13 years 5 months ago
On Some Weaknesses in the Disk Encryption Schemes EME and EME2
Abstract. Tweakable enciphering schemes are a certain type of blockcipher mode of operation which provide security in the sense of a strong pseudo-random permutation. It has been p...
Cuauhtemoc Mancillas-López, Debrup Chakrabo...