Sciweavers

320 search results - page 34 / 64
» Conditionals and consequences
Sort
View
CEAS
2004
Springer
14 years 3 months ago
Shall We Stop All Unsolicited Email Messages?
Spam is commonly defined as unsolicited email messages, and the goal of spam filtering is to eliminate these messages. In this paper, we argue that not all unsolicited email messag...
Rui Dai, Kang Li
CHES
2004
Springer
187views Cryptology» more  CHES 2004»
14 years 3 months ago
A New Attack with Side Channel Leakage During Exponent Recoding Computations
In this paper we propose a new side channel attack, where exponent recodings for public key cryptosystems such as RSA and ECDSA are considered. The known side channel attacks and c...
Yasuyuki Sakai, Kouichi Sakurai
JCDCG
2004
Springer
14 years 3 months ago
Single-Vertex Origami and Spherical Expansive Motions
We prove that all single-vertex origami shapes are reachable from the open flat state via simple, non-crossing motions. We also consider conical paper, where the total sum of the ...
Ileana Streinu, Walter Whiteley
CHI
2009
ACM
14 years 10 months ago
Difficulties in establishing common ground in multiparty groups using machine translation
When people communicate in their native languages using machine translation, they face various problems in constructing common ground. This study investigates the difficulties of ...
Naomi Yamashita, Rieko Inaba, Hideaki Kuzuoka, Tor...
PG
2003
IEEE
14 years 3 months ago
Hierarchical Least Squares Conformal Map
A texture atlas is an efficient way to represent information (like colors, normals, displacement maps ...) on triangulated surfaces. The LSCM method (Least Squares Conformal Maps...
Nicolas Ray, Bruno Lévy