Sciweavers

998 search results - page 97 / 200
» From Feasible Proofs to Feasible Computations
Sort
View
ESAS
2004
Springer
14 years 2 months ago
Public Key Cryptography in Sensor Networks - Revisited
The common perception of public key cryptography is that it is complex, slow and power hungry, and as such not at all suitable for use in ultra-low power environments like wireless...
Gunnar Gaubatz, Jens-Peter Kaps, Berk Sunar
SERVICES
2008
246views more  SERVICES 2008»
13 years 10 months ago
BioFlow: A Web-Based Declarative Workflow Language for Life Sciences
Scientific workflows in Life Sciences are usually complex, and use many online databases, analysis tools, publication repositories and customized computation intensive desktop sof...
Hasan M. Jamil, Bilal El-Hajj-Diab
CHI
2008
ACM
14 years 9 months ago
Rapid image analysis using neural signals
The problem of extracting information from large collections of imagery is a challenge with few good solutions. Computers typically cannot interpret imagery as effectively as huma...
Santosh Mathan, Deniz Erdogmus, Yonghong Huang, Mi...
CHI
2005
ACM
14 years 9 months ago
Hug over a distance
People in close relationships, who are separated by distance, often have difficulty expressing intimacy adequately. Based on the results of an ethnographic study with couples, a p...
Florian Mueller, Frank Vetere, Martin R. Gibbs, Je...
ACMSE
2009
ACM
14 years 3 months ago
Bit vector algorithms enabling high-speed and memory-efficient firewall blacklisting
In a world of increasing Internet connectivity coupled with increasing computer security risks, security conscious network applications implementing blacklisting technology are be...
J. Lane Thames, Randal Abler, David Keeling