Sciweavers

63 search results - page 10 / 13
» Lookup Tables, Recurrences and Complexity
Sort
View
FC
2010
Springer
226views Cryptology» more  FC 2010»
13 years 11 months ago
Shoulder-Surfing Safe Login in a Partially Observable Attacker Model
Abstract. Secure login methods based on human cognitive skills can be classified into two categories based on information available to a passive attacker: (i) the attacker fully ob...
Toni Perkovic, Mario Cagalj, Nitesh Saxena
ICASSP
2010
IEEE
13 years 7 months ago
Optimal delayed decoding of predictively encoded sources
Predictive coding eliminates redundancy due to correlations between the current and past signal samples, so that only the innovation, or prediction residual, needs to be encoded. ...
Vinay Melkote, Kenneth Rose
TOCHI
2002
63views more  TOCHI 2002»
13 years 7 months ago
Rivalry and interference with a head-mounted display
Perceptual factors that effect monocular, transparent (a.k.a "see-thru") head mounted displays include binocular rivalry, visual interference, and depth of focus. We rep...
Robert S. Laramee, Colin Ware
WCNC
2010
IEEE
13 years 6 months ago
A Recursive Battery Model for Nodes Lifetime Estimation in Wireless Sensor Networks
—Since sensor nodes use batteries as their source of energy, energy-based routing becomes an important requirement to extend network lifetime. This routing is done using the node...
Joseph Rahmé, Nicolas Fourty, Khaldoun Al A...
IPTPS
2005
Springer
14 years 1 months ago
Arpeggio: Metadata Searching and Content Sharing with Chord
Arpeggio is a peer-to-peer file-sharing network based on the Chord lookup primitive. Queries for data whose metadata matches a certain criterion are performed efficiently by using...
Austin T. Clements, Dan R. K. Ports, David R. Karg...