Sciweavers

650 search results - page 57 / 130
» Distorting symmetric designs
Sort
View
JIPS
2006
96views more  JIPS 2006»
13 years 8 months ago
Digital Controller of a Diesel Generator using an Embedded System
: We have designed an embedded controller for the control of a diesel generator using an embedded system. The generator is monitored and controlled remotely via the internet in rea...
Kwang Seon Ahn
FSE
2009
Springer
159views Cryptology» more  FSE 2009»
14 years 3 months ago
Intel's New AES Instructions for Enhanced Performance and Security
The Advanced Encryption Standard (AES) is the Federal Information Processing Standard for symmetric encryption. It is widely believed to be secure and efficient, and is therefore b...
Shay Gueron
FOCS
2007
IEEE
14 years 3 months ago
Maximizing Non-Monotone Submodular Functions
Submodular maximization generalizes many important problems including Max Cut in directed/undirected graphs and hypergraphs, certain constraint satisfaction problems and maximum f...
Uriel Feige, Vahab S. Mirrokni, Jan Vondrák
ICDCS
2010
IEEE
13 years 6 months ago
Secure Ranked Keyword Search over Encrypted Cloud Data
As Cloud Computing becomes prevalent, sensitive information are being increasingly centralized into the cloud. For the protection of data privacy, sensitive data has to be encrypte...
Cong Wang, Ning Cao, Jin Li, Kui Ren, Wenjing Lou
UIST
1999
ACM
14 years 1 months ago
Supporting Awareness and Interaction Through Collaborative Virtual Interfaces
This paper explores interfaces to virtual environments supporting multiple users. An interface to an environment allowing interaction with virtual artefacts is constructed, drawin...
Mike Fraser, Steve Benford, Jon Hindmarsh, Christi...