Sciweavers

10995 search results - page 2096 / 2199
» Positioning
Sort
View
IJNSEC
2008
98views more  IJNSEC 2008»
13 years 9 months ago
An Update on the Analysis and Design of NMAC and HMAC Functions
In this paper, we investigate the issues in the analysis and design of provably secure message authentication codes (MACs) Nested MAC (NMAC) and Hash based MAC (HMAC) proposed by ...
Praveen Gauravaram, Shoichi Hirose, Suganya Annadu...
CGF
2007
149views more  CGF 2007»
13 years 9 months ago
Interactive Simulation of the Human Eye Depth of Field and Its Correction by Spectacle Lenses
This paper describes a fast rendering algorithm for verification of spectacle lens design. Our method simulates refraction corrections of astigmatism as well as myopia or presbyo...
Masanori Kakimoto, Tomoaki Tatsukawa, Yukiteru Muk...
CGF
2007
158views more  CGF 2007»
13 years 9 months ago
Manipulating, Deforming and Animating Sampled Object Representations
A sampled object representation (SOR) defines a graphical model using data obtained from a sampling process, which takes a collection of samples at discrete positions in space in...
Min Chen, Carlos D. Correa, Shoukat Islam, Mark W....
CIE
2007
Springer
13 years 9 months ago
Multimodal multiplayer tabletop gaming
There is a large disparity between the rich physical interfaces of co-located arcade games and the generic input devices seen in most home console systems. In this paper we argue ...
Edward Tse, Saul Greenberg, Chia Shen, Clifton For...
CN
2007
133views more  CN 2007»
13 years 9 months ago
Automatic high-performance reconstruction and recovery
Self-protecting systems require the ability to instantaneously detect malicious activity at run-time and prevent execution. We argue that it is impossible to perfectly self-protec...
Ashvin Goel, Wu-chang Feng, Wu-chi Feng, David Mai...
« Prev « First page 2096 / 2199 Last » Next »