Sciweavers

13277 search results - page 2655 / 2656
» An Approach to Clustering Abstracts
Sort
View
TON
2012
11 years 10 months ago
A New Cell-Counting-Based Attack Against Tor
Abstract—Various low-latency anonymous communication systems such as Tor and Anonymizer have been designed to provide anonymity service for users. In order to hide the communicat...
Zhen Ling, Junzhou Luo, Wei Yu, Xinwen Fu, Dong Xu...
TVCG
2012
215views Hardware» more  TVCG 2012»
11 years 10 months ago
Geometric Calibration of Head-Mounted Displays and its Effects on Distance Estimation
Abstract—Head-mounted displays (HMDs) allow users to observe virtual environments (VEs) from an egocentric perspective. However, several experiments have provided evidence that e...
Falko Kellner, Benjamin Bolte, Gerd Bruder, Ulrich...
LICS
2012
IEEE
11 years 10 months ago
An Automata Model for Trees with Ordered Data Values
—Data trees are trees in which each node, besides carrying a label from a finite alphabet, also carries a data value infinite domain. They have been used as an abstraction mode...
Tony Tan
EUROCRYPT
2012
Springer
11 years 10 months ago
Improving the Complexity of Index Calculus Algorithms in Elliptic Curves over Binary Fields
Abstract. The goal of this paper is to further study the index calculus method that was first introduced by Semaev for solving the ECDLP and later developed by Gaudry and Diem. In...
Jean-Charles Faugère, Ludovic Perret, Chris...
ICDCS
2012
IEEE
11 years 10 months ago
eTransform: Transforming Enterprise Data Centers by Automated Consolidation
Abstract—Modern day enterprises have a large IT infrastructure comprising thousands of applications running on servers housed in tens of data centers geographically spread out. T...
Rahul Singh, Prashant J. Shenoy, K. K. Ramakrishna...
« Prev « First page 2655 / 2656 Last » Next »