Sciweavers

1834 search results - page 330 / 367
» Public Key Cryptography
Sort
View
144
Voted
ICMI
2010
Springer
189views Biometrics» more  ICMI 2010»
15 years 22 days ago
Gesture and voice prototyping for early evaluations of social acceptability in multimodal interfaces
Interaction techniques that require users to adopt new behaviors mean that designers must take into account social acceptability and user experience otherwise the techniques may b...
Julie Rico, Stephen A. Brewster
127
Voted
EUROPKI
2009
Springer
15 years 17 days ago
A Computational Framework for Certificate Policy Operations
The trustworthiness of any Public Key Infrastructure (PKI) rests upon the expectations for trust, and the degree to which those expectations are met. Policies, whether implicit as ...
Gabriel A. Weaver, Scott A. Rea, Sean W. Smith
118
Voted
CORR
2010
Springer
82views Education» more  CORR 2010»
14 years 11 months ago
Secret-key Agreement with Channel State Information at the Transmitter
We study the capacity of secret-key agreement over a wiretap channel with state parameters. The transmitter communicates to the legitimate receiver and the eavesdropper over a disc...
Ashish Khisti, Suhas N. Diggavi, Gregory W. Wornel...
158
Voted
CORR
2010
Springer
194views Education» more  CORR 2010»
14 years 11 months ago
An Effective Method of Image Retrieval using Image Mining Techniques
The present research scholars are having keen interest in doing their research activities in the area of Data mining all over the world. Especially, [13]Mining Image data is the o...
A. Kannan, V. Mohan, N. Anbazhagan
116
Voted
COLING
2010
14 years 9 months ago
EMMA: A novel Evaluation Metric for Morphological Analysis
We present a novel Evaluation Metric for Morphological Analysis (EMMA) that is both linguistically appealing and empirically sound. EMMA uses a graphbased assignment algorithm, op...
Sebastian Spiegler, Christian Monson