Sciweavers

953 search results - page 139 / 191
» A note on the paper
Sort
View
ICASSP
2011
IEEE
12 years 11 months ago
Optimal structure of memory models for lossless compression of binary image contours
In this paper we study various chain codes, which are representations of binary image contours, in terms of their ability to compress in the best way the contour information using...
Ioan Tabus, Septimia Sarbu
CHI
2011
ACM
12 years 11 months ago
Active reading and its discontents: the situations, problems and ideas of readers
The increasing popularity of personal reading devices raises the question of how best to support so-called active reading, which involves acts like annotation, note taking, etc. P...
Craig S. Tashman, W. Keith Edwards
CHI
2011
ACM
12 years 11 months ago
Developmentally situated design (DSD): making theoretical knowledge accessible to designers of children's technology
There is a wealth of theoretical knowledge about the developmental abilities and skills of children. However, this knowledge is not readily accessible to designers of interactive ...
Tilde Bekker, Alissa Nicole Antle
CRYPTO
2012
Springer
219views Cryptology» more  CRYPTO 2012»
11 years 10 months ago
Tamper and Leakage Resilience in the Split-State Model
It is notoriously difficult to create hardware that is immune from side channel and tampering attacks. A lot of recent literature, therefore, has instead considered algorithmic de...
Feng-Hao Liu, Anna Lysyanskaya
PET
2012
Springer
11 years 10 months ago
Use Fewer Instances of the Letter "i": Toward Writing Style Anonymization
This paper presents Anonymouth, a novel framework for anonymizing writing style. Without accounting for style, anonymous authors risk identification. This framework is necessary t...
Andrew W. E. McDonald, Sadia Afroz, Aylin Caliskan...