Sciweavers

194 search results - page 29 / 39
» Computing Roundness is Easy if the Set is Almost Round
Sort
View
TCC
2010
Springer
208views Cryptology» more  TCC 2010»
14 years 4 months ago
Rationality in the Full-Information Model
We study rationality in protocol design for the full-information model, a model characterized by computationally unbounded adversaries, no private communication, and no simultanei...
Ronen Gradwohl
CTRSA
2010
Springer
257views Cryptology» more  CTRSA 2010»
14 years 2 months ago
Practical Key Recovery Attack against Secret-IV Edon-
Abstract. The SHA-3 competition has been organized by NIST to select a new hashing standard. Edon-R was one of the fastest candidates in the first round of the competition. In thi...
Gaëtan Leurent
HAPTICS
2005
IEEE
14 years 1 months ago
Selective Stimulation to Superficial Mechanoreceptors by Temporal Control of Suction Pressure
In this paper we propose a new set of primitives to realize a large-area covering realistic tactile display. They stimulate the skin surface with suction pressure (SPS method) as ...
Yasutoshi Makino, Hiroyuki Shinoda
ICNP
2005
IEEE
14 years 1 months ago
Can coexisting overlays inadvertently step on each other?
By allowing end hosts to make routing decisions at the application level, different overlay networks may unintentionally interfere with each other. This paper describes how multip...
Ram Keralapura, Chen-Nee Chuah, Nina Taft, Gianluc...
ISCAS
2005
IEEE
115views Hardware» more  ISCAS 2005»
14 years 1 months ago
Progressive scrambling for MP3 audio
– Audio scrambling can be employed in audio distribution for the purpose of guaranteeing the confidentiality. Electronic commerce in audio products would be facilitated by the de...
Wei-Gang Fu, Wei-Qi Yan, Mohan S. Kankanhalli