Sciweavers

1358 search results - page 142 / 272
» Mapping Accessibility Over Time
Sort
View
TRIDENTCOM
2010
IEEE
13 years 6 months ago
From Kansei to KanseiGenie: Architecture of Federated, Programmable Wireless Sensor Fabrics
Abstract. This paper deals with challenges in federating wireless sensing fabrics. Federations of this sort are currently being developed in next generation global end-to-end exper...
Mukundan Sridharan, Wenjie Zeng, William Leal, Xi ...
IACR
2011
161views more  IACR 2011»
12 years 8 months ago
Roots of Square: Cryptanalysis of Double-Layer Square and Square+
Abstract. Square is a multivariate quadratic encryption scheme proposed in 2009. It is a specialization of Hidden Field Equations by using only odd characteristic elds and also X2...
Enrico Thomae, Christopher Wolf
CCS
2005
ACM
14 years 2 months ago
Automated trust negotiation using cryptographic credentials
In automated trust negotiation (ATN), two parties exchange digitally signed credentials that contain attribute information to establish trust and make access control decisions. Be...
Jiangtao Li, Ninghui Li, William H. Winsborough
VCIP
2003
126views Communications» more  VCIP 2003»
13 years 10 months ago
Media handling for visual information retrieval in VizIR
This paper describes how the handling of visual media objects is implemented in the visual information retrieval project VizIR. Essentially, four areas are concerned: media access...
Horst Eidenberger
BMCBI
2008
137views more  BMCBI 2008»
13 years 9 months ago
Evading the annotation bottleneck: using sequence similarity to search non-sequence gene data
Background: Non-sequence gene data (images, literature, etc.) can be found in many different public databases. Access to these data is mostly by text based methods using gene name...
Michael J. Gilchrist, Mikkel B. Christensen, Richa...