Sciweavers

1189 search results - page 201 / 238
» Information Concealing Games
Sort
View
ESORICS
2009
Springer
14 years 4 months ago
A Quantitative Analysis of Indistinguishability for a Continuous Domain Biometric Cryptosystem
Abstract. Biometric information is regarded as highly sensitive information and therefore encryption techniques for biometric information are needed to address security and privacy...
Ileana Buhan, Jeroen Breebaart, Jorge Guajardo, Ko...
C5
2004
IEEE
14 years 1 months ago
Scratch: A Sneak Preview
information technologies as "the ability to reformulate knowledge, to express oneself creatively and appropriately, and to produce and generate information (rather than simply...
John Maloney, Leo Burd, Yasmin B. Kafai, Natalie R...
ICIP
2004
IEEE
14 years 11 months ago
Event detection based on non-broadcast sports video
Most recent research work on sports video analysis focuses on broadcast video. The broadcast video is a post-produced video and has much additional editing information inserted. I...
Jinjun Wang, Changsheng Xu, Chng Eng Siong, Xinguo...
ICFP
2009
ACM
14 years 10 months ago
A functional I/O system or, fun for freshman kids
Functional programming languages ought to play a central role in mathematics education for middle schools (age range: 10?14). After all, functional programming is a form of algebr...
Matthias Felleisen, Robert Bruce Findler, Matthew ...
CHI
2009
ACM
14 years 10 months ago
In CMC we trust: the role of similarity
This paper examines how different forms of linguistic similarity in a text-chat environment relate to the establishment of interpersonal trust. Sixty-two pairs played an iterative...
Lauren E. Scissors, Alastair J. Gill, Kathleen Ger...