Sciweavers

649 search results - page 47 / 130
» Enabling Public Discourse
Sort
View
PERCOM
2007
ACM
14 years 7 months ago
A three round authenticated group key agreement protocol for ad hoc networks
Group Key Agreement (GKA) protocols enable the participants to derive a key based on each one's contribution over a public network without any central authority. They also pr...
Daniel Augot, Raghav Bhaskar, Valérie Issarny, Da...
HICSS
2010
IEEE
144views Biometrics» more  HICSS 2010»
14 years 2 months ago
Tweet, Tweet, Retweet: Conversational Aspects of Retweeting on Twitter
Twitter—a microblogging service that enables users to post messages (“tweets”) of up to 140 characters—supports a variety of communicative practices; participants use Twit...
Danah Boyd, Scott Golder, Gilad Lotan
ISBI
2009
IEEE
14 years 2 months ago
Nuclear Segmentation in Microscope Cell Images: A Hand-Segmented Dataset and Comparison of Algorithms
Image segmentation is an essential step in many image analysis pipelines and many algorithms have been proposed to solve this problem. However, they are often evaluated subjective...
Luís Pedro Coelho, Aabid Shariff, Robert F....
CTRSA
2009
Springer
127views Cryptology» more  CTRSA 2009»
14 years 2 months ago
Securing RSA against Fault Analysis by Double Addition Chain Exponentiation
Abstract. Fault Analysis is a powerful cryptanalytic technique that enables to break cryptographic implementations embedded in portable devices more efficiently than any other tech...
Matthieu Rivain
ICIAP
2009
ACM
14 years 2 months ago
Re-photography and Environment Monitoring Using a Social Sensor Network
This paper presents a technology capable of enabling the creation of a diffuse, calibrated vision-sensor network from the wealth of socially generated geo-referenced imagery, freel...
Paul Chippendale, Michele Zanin, Claudio Andreatta