Sciweavers

363 search results - page 37 / 73
» About paths with two blocks
Sort
View
FC
2010
Springer
173views Cryptology» more  FC 2010»
13 years 11 months ago
A Case Study on Measuring Statistical Data in the Tor Anonymity Network
The Tor network is one of the largest deployed anonymity networks, consisting of 1500+ volunteer-run relays and probably hundreds of thousands of clients connecting every day. Its ...
Karsten Loesing, Steven J. Murdoch, Roger Dingledi...
CHI
2011
ACM
13 years 1 months ago
Usable gestures for blind people: understanding preference and performance
Despite growing awareness of the accessibility issues surrounding touch screen use by blind people, designers still face challenges when creating accessible touch screen interface...
Shaun K. Kane, Jacob O. Wobbrock, Richard E. Ladne...
IACR
2011
107views more  IACR 2011»
12 years 9 months ago
Structure Preserving CCA Secure Encryption and Its Application to Oblivious Third Parties
In this paper we present the first public key encryption scheme that is structure preserving, i.e., our encryption scheme uses only algebraic operations. In particular it does not...
Jan Camenisch, Kristiyan Haralambiev, Markulf Kohl...
MOBIHOC
2003
ACM
14 years 9 months ago
SHORT: self-healing and optimizing routing techniques for mobile ad hoc networks
On demand routing protocols provide scalable and costeffective solutions for packet routing in mobile wireless ad hoc networks. The paths generated by these protocols may deviate ...
Chao Gui, Prasant Mohapatra
ISCAS
2007
IEEE
124views Hardware» more  ISCAS 2007»
14 years 4 months ago
CMOS Current-controlled Oscillators
— The work presented in this paper is about the design of current-controlled oscillators (ICO). Two ICOs are proposed. Aiming at reducing the duration of the short-circuit curren...
Junhong Zhao, Chunyan Wang