Sciweavers

783 search results - page 65 / 157
» Bridging the Gaps
Sort
View
FORTE
2009
13 years 8 months ago
Epistemic Logic for the Applied Pi Calculus
We propose an epistemic logic for the applied pi calculus, which is a variant of the pi calculus with extensions for modeling cryptographic protocols. In such a calculus, the secur...
Rohit Chadha, Stéphanie Delaune, Steve Krem...
HCI
2009
13 years 8 months ago
TACTUS: A Hardware and Software Testbed for Research in Multi-Touch Interaction
This paper presents the TACTUS Multi-Touch Research Testbed, a hardware and software system for enabling research in multi-touch interaction. A detailed discussion is provided on h...
Paul Varcholik, Joseph J. LaViola Jr., Denise M. N...
ICUMT
2009
13 years 8 months ago
Extending middleware frameworks for Wireless Sensor Networks
We define sensor middleware as the binding code mainly running between the sensor OS and applications g programming abstractions to bridge the gap between application developers an...
Syed Rehan Afzal, Christophe Huygens, Wouter Joose...
FLAIRS
2011
13 years 2 months ago
No Peanuts! Affective Cues for the Virtual Bartender
The aim of this paper is threefold: it explores methods for the detection of affective states in text, it presents the usage of such affective cues in a conversational system and ...
Marcin Skowron, Hannes Pirker, Stefan Rank, Georgi...
IACR
2011
166views more  IACR 2011»
12 years 10 months ago
Bicliques for Preimages: Attacks on Skein-512 and the SHA-2 family
We introduce a new concept in splice-and-cut attacks on hash functions, which bridges the gap between preimage attacks and a powerful method of differential cryptanalysis. The ne...
Dmitry Khovratovich, Christian Rechberger, Alexand...