Sciweavers

29908 search results - page 5960 / 5982
» On the complexity of communication complexity
Sort
View
HUC
2011
Springer
12 years 7 months ago
LightWave: using compact fluorescent lights as sensors
In this paper, we describe LightWave, a sensing approach that turns ordinary compact fluorescent light (CFL) bulbs into sensors of human proximity. Unmodified CFL bulbs are shown ...
Sidhant Gupta, Ke-Yu Chen, Matthew S. Reynolds, Sh...
HUC
2011
Springer
12 years 7 months ago
Mediated tabletop interaction in the biology lab: exploring the design space of the rabbit
Interactive surfaces like diffuse illumination tabletops (DIT) identify and track objects using multiple techniques like shape and color recognition, fiducial markers, electronic...
Juan David Hincapié-Ramos, Aurélien ...
IACR
2011
111views more  IACR 2011»
12 years 7 months ago
Secure Multi-Party Sorting and Applications
Sorting is among the most fundamental and well-studied problems within computer science and a core step of many algorithms. In this article, we consider the problem of constructing...
Kristján Valur Jónsson, Gunnar Kreit...
IACR
2011
87views more  IACR 2011»
12 years 7 months ago
Is privacy compatible with truthfulness?
In the area of privacy-preserving data mining, a differentially private mechanism intuitively encourages people to share their data truthfully because they are at little risk of ...
David Xiao
IACR
2011
132views more  IACR 2011»
12 years 7 months ago
Tamper-Proof Circuits: How to Trade Leakage for Tamper-Resilience
Abstract. Tampering attacks are cryptanalytic attacks on the implementation of cryptographic algorithms (e.g., smart cards), where an adversary introduces faults with the hope that...
Sebastian Faust, Krzysztof Pietrzak, Daniele Ventu...
« Prev « First page 5960 / 5982 Last » Next »