Abstract-The emergence of small, inexpensive, networkcapable sensing devices led to a great deal of research on the design and implementation of sensor networks. A critical step in...
Riccardo Crepaldi, Simone Friso, Albert F. Harris ...
In this paper we explore private computation built on vector addition and its applications in privacypreserving data mining. Vector addition is a surprisingly general tool for imp...
The Automatic Authentication Protocol Analyzer, 2nd Version AAPA2 is a fast, completely automatic tool for formally analyzing cryptographic protocols. It correctly identi es vulne...
Video protocol analysis is a standard technique in many research disciplines including human-computerinteraction and computer supported cooperative work. It is notoriously time co...
To help consumers dealing with their growing amount of home video, we have developed the Edit While Watching (EWW) system. It is designed to automatically create an edited version...