Sciweavers

783 search results - page 65 / 157
» Bridging the Gap
Sort
View
FORTE
2009
13 years 5 months ago
Epistemic Logic for the Applied Pi Calculus
We propose an epistemic logic for the applied pi calculus, which is a variant of the pi calculus with extensions for modeling cryptographic protocols. In such a calculus, the secur...
Rohit Chadha, Stéphanie Delaune, Steve Krem...
HCI
2009
13 years 5 months ago
TACTUS: A Hardware and Software Testbed for Research in Multi-Touch Interaction
This paper presents the TACTUS Multi-Touch Research Testbed, a hardware and software system for enabling research in multi-touch interaction. A detailed discussion is provided on h...
Paul Varcholik, Joseph J. LaViola Jr., Denise M. N...
ICUMT
2009
13 years 5 months ago
Extending middleware frameworks for Wireless Sensor Networks
We define sensor middleware as the binding code mainly running between the sensor OS and applications g programming abstractions to bridge the gap between application developers an...
Syed Rehan Afzal, Christophe Huygens, Wouter Joose...
FLAIRS
2011
12 years 11 months ago
No Peanuts! Affective Cues for the Virtual Bartender
The aim of this paper is threefold: it explores methods for the detection of affective states in text, it presents the usage of such affective cues in a conversational system and ...
Marcin Skowron, Hannes Pirker, Stefan Rank, Georgi...
IACR
2011
166views more  IACR 2011»
12 years 7 months ago
Bicliques for Preimages: Attacks on Skein-512 and the SHA-2 family
We introduce a new concept in splice-and-cut attacks on hash functions, which bridges the gap between preimage attacks and a powerful method of differential cryptanalysis. The ne...
Dmitry Khovratovich, Christian Rechberger, Alexand...