Sciweavers

32 search results - page 6 / 7
» How to Get Your LISA Paper Accepted
Sort
View
BIOSIG
2010
136views Biometrics» more  BIOSIG 2010»
13 years 5 months ago
User Survey on Phone Security and Usage
Abstract: Mobile phones are widely used nowadays and during the last years developed from simple phones to small computers with an increasing number of features. These result in a ...
Frank Breitinger, Claudia Nickel
FOCS
1999
IEEE
13 years 11 months ago
Near-Optimal Conversion of Hardness into Pseudo-Randomness
Various efforts ([?, ?, ?]) have been made in recent years to derandomize probabilistic algorithms using the complexity theoretic assumption that there exists a problem in E = dti...
Russell Impagliazzo, Ronen Shaltiel, Avi Wigderson
ASPDAC
2000
ACM
95views Hardware» more  ASPDAC 2000»
13 years 11 months ago
Fair watermarking techniques
Many intellectual property protection (IPP) techniques have been proposed. Their primary objectives are providing convincible proof of authorship with least degradation of the qua...
Gang Qu, Jennifer L. Wong, Miodrag Potkonjak
PSYCHNOLOGY
2006
70views more  PSYCHNOLOGY 2006»
13 years 7 months ago
Navigating Information Space: Web site design and lessons from the built environment
The Web is the archetypal information space but even on a well designed site it can be difficult to find all the information you need. It is impossible to design a site so that al...
David Benyon
ELPUB
2008
ACM
13 years 9 months ago
AudioKrant, the daily spoken newspaper
Being subscribed to a newspaper, readers expect some basic things: receiving their paper in their mailbox early in the morning, being able to read it privately when and where they...
Bert Paepen