Sciweavers

3025 search results - page 507 / 605
» Interaction in the large
Sort
View
CRYPTO
2000
Springer
175views Cryptology» more  CRYPTO 2000»
14 years 1 months ago
A Chosen-Ciphertext Attack against NTRU
We present a chosen-ciphertext attack against the public key cryptosystem called NTRU. This cryptosystem is based on polynomial algebra. Its security comes from the interaction of ...
Éliane Jaulmes, Antoine Joux
CHI
1999
ACM
14 years 1 months ago
Manual and Gaze Input Cascaded (MAGIC) Pointing
This work explores a new direction in utilizing eye gaze for computer input. Gaze tracking has long been considered as an alternative or potentially superior pointing method for c...
Shumin Zhai, Carlos Morimoto, Steven Ihde
SIGMOD
1999
ACM
183views Database» more  SIGMOD 1999»
14 years 1 months ago
OPTICS: Ordering Points To Identify the Clustering Structure
Cluster analysis is a primary method for database mining. It is either used as a stand-alone tool to get insight into the distribution of a data set, e.g. to focus further analysi...
Mihael Ankerst, Markus M. Breunig, Hans-Peter Krie...
TPHOL
1999
IEEE
14 years 1 months ago
Three Tactic Theorem Proving
Abstract. We describe the key features of the proof description language of Declare, an experimental theorem prover for higher order logic. We take a somewhat radical approach to p...
Don Syme
VISUALIZATION
1996
IEEE
14 years 1 months ago
Flexible Information Visualization of Multivariate Data from Biological Sequence Similarity Searches
Information visualization faces challenges presented by the need to represent abstract data and the relationships within the data. Previously, we presented a system for visualizin...
Ed Huai-hsin Chi, John Riedl, Elizabeth Shoop, Joh...