Sciweavers

105 search results - page 19 / 21
» Robust Authentication Using Physically Unclonable Functions
Sort
View
FOCS
2006
IEEE
14 years 1 months ago
Secure Multiparty Quantum Computation with (Only) a Strict Honest Majority
Secret sharing and multiparty computation (also called “secure function evaluation”) are fundamental primitives in modern cryptography, allowing a group of mutually distrustfu...
Michael Ben-Or, Claude Crépeau, Daniel Gott...
UPP
2004
Springer
14 years 24 days ago
From Prescriptive Programming of Solid-State Devices to Orchestrated Self-organisation of Informed Matter
Abstract. Achieving real-time response to complex, ambiguous, highbandwidth data is impractical with conventional programming. Only the narrow class of compressible input-output ma...
Klaus-Peter Zauner
JSCIC
2007
85views more  JSCIC 2007»
13 years 7 months ago
On Boundary Condition Capturing for Multiphase Interfaces
This paper begins with an overview of the boundary condition capturing approach to solving problems with interfaces. Although, the authors’ original motivation was to extend the...
Jeong-Mo Hong, Tamar Shinar, Myungjoo Kang, Ronald...
RTSS
2007
IEEE
14 years 1 months ago
Adapting Futures: Scalability for Real-World Computing
Creating robust real-time embedded software is critical in combining the physical world with computing, such as in consumer electronics or robotics. One challenge is the complexit...
Johannes Helander, Risto Serg, Margus Veanes, Prit...
CGF
2011
12 years 11 months ago
BSSRDF Estimation from Single Images
We present a novel method to estimate an approximation of the reflectance characteristics of optically thick, homogeneous translucent materials using only a single photograph as ...
Adolfo Muñoz, Jose I. Echevarria, Francisco...