Sciweavers

2340 search results - page 350 / 468
» Data abstraction and information hiding
Sort
View
ICALP
2001
Springer
14 years 2 months ago
Secure Games with Polynomial Expressions
Abstract. We present the first private information retrieval (PIR) scheme which is both, deterministically correct and has poly-logarithmic communication complexity. Our PIR proto...
Aggelos Kiayias, Moti Yung
IH
2001
Springer
14 years 2 months ago
Keyless Public Watermarking for Intellectual Property Authentication
Abstract. A constraint-based watermarking technique has been introduced for the protection of intellectual properties such as hardware, software, algorithms, and solutions to hard ...
Gang Qu
INFOCOM
2000
IEEE
14 years 2 months ago
Virtual Backbone Generation and Maintenance in Ad Hoc Network Mobility Management
Abstract—In this paper, we present the implementation issues of a virtual backbone that supports the operations of the Uniform Quorum System (UQS) and the Randomized Database Gro...
Ben Liang, Zygmunt J. Haas
DAWAK
2000
Springer
14 years 2 months ago
COFE: A Scalable Method for Feature Extraction from Complex Objects
Abstract. Feature Extraction, also known as Multidimensional Scaling, is a basic primitive associated with indexing, clustering, nearest neighbor searching and visualization. We co...
Gabriela Hristescu, Martin Farach-Colton
HAPTICS
2010
IEEE
14 years 2 months ago
Haptic/VR Assessment Tool for Fine Motor Control
Abstract. The Nine Hole Peg Test (NHPT) is routinely used in clinical environments to evaluate a patient's fine hand control. A physician measures the total time required to i...
Christophe Emery, Evren Samur, Olivier Lambercy, H...