Sciweavers

790 search results - page 142 / 158
» Designated Confirmer Signatures
Sort
View
CCS
2008
ACM
13 years 9 months ago
Securing group key exchange against strong corruptions
When users run a group key exchange (GKE) protocol, they usually extract the key from some auxiliary (ephemeral) secret information generated during the execution. Strong corrupti...
Emmanuel Bresson, Mark Manulis
ASSETS
2005
ACM
13 years 9 months ago
Verification of computer display pre-compensation for visual aberrations in an artificial eye
The possibility of pre-compensating images in a computer display according to the visual aberrations previously assessed in an optical system (e.g., the computer user’s eye) has...
Miguel Alonso Jr., Armando Barreto, Julie A. Jacko...
CIVR
2008
Springer
125views Image Analysis» more  CIVR 2008»
13 years 9 months ago
Leveraging user query log: toward improving image data clustering
Image clustering is useful in many retrieval and classification applications. The main goal of image clustering is to partition a given dataset into salient clusters such that the...
Hao Cheng, Kien A. Hua, Khanh Vu
BIOCOMP
2007
13 years 9 months ago
xMAN: extreme MApping of oligoNucleotides
Background: The ability to rapidly map millions of oligonucleotide fragments to a reference genome is crucial to many high throughput genomic technologies. Results: We propose an ...
Wei Li, Jason S. Carroll, Myles Brown, X. Shirley ...
SOCRATES
2008
133views Education» more  SOCRATES 2008»
13 years 9 months ago
From Daily Language to Scientific Jargon: The Role of Peer Interaction in Web Forum
The paper presents the activities and the results of the "Child Observation in school context workshop", an on line course realized during the last academic years at Mac...
P. Nicolini, T. Lapucci