Sciweavers

1834 search results - page 330 / 367
» Public Key Cryptography
Sort
View
ICMI
2010
Springer
189views Biometrics» more  ICMI 2010»
13 years 5 months ago
Gesture and voice prototyping for early evaluations of social acceptability in multimodal interfaces
Interaction techniques that require users to adopt new behaviors mean that designers must take into account social acceptability and user experience otherwise the techniques may b...
Julie Rico, Stephen A. Brewster
EUROPKI
2009
Springer
13 years 5 months ago
A Computational Framework for Certificate Policy Operations
The trustworthiness of any Public Key Infrastructure (PKI) rests upon the expectations for trust, and the degree to which those expectations are met. Policies, whether implicit as ...
Gabriel A. Weaver, Scott A. Rea, Sean W. Smith
CORR
2010
Springer
82views Education» more  CORR 2010»
13 years 4 months ago
Secret-key Agreement with Channel State Information at the Transmitter
We study the capacity of secret-key agreement over a wiretap channel with state parameters. The transmitter communicates to the legitimate receiver and the eavesdropper over a disc...
Ashish Khisti, Suhas N. Diggavi, Gregory W. Wornel...
CORR
2010
Springer
194views Education» more  CORR 2010»
13 years 4 months ago
An Effective Method of Image Retrieval using Image Mining Techniques
The present research scholars are having keen interest in doing their research activities in the area of Data mining all over the world. Especially, [13]Mining Image data is the o...
A. Kannan, V. Mohan, N. Anbazhagan
COLING
2010
13 years 2 months ago
EMMA: A novel Evaluation Metric for Morphological Analysis
We present a novel Evaluation Metric for Morphological Analysis (EMMA) that is both linguistically appealing and empirically sound. EMMA uses a graphbased assignment algorithm, op...
Sebastian Spiegler, Christian Monson