Sciweavers

1282 search results - page 206 / 257
» Signing on signing off
Sort
View
PKC
2010
Springer
187views Cryptology» more  PKC 2010»
13 years 11 months ago
Confidential Signatures and Deterministic Signcryption
Encrypt-and-sign, where one encrypts and signs a message in parallel, is usually not recommended for confidential message transmission. The reason is that the signature typically l...
Alexander W. Dent, Marc Fischlin, Mark Manulis, Ma...
ASAP
2007
IEEE
97views Hardware» more  ASAP 2007»
13 years 11 months ago
FPGA-Based Efficient Design Approach for Large-Size Two's Complement Squarers
This paper presents an optimized design approach of two’s complement large-size squarers using embedded multipliers in FPGAs. The realization is based on BaughWooley’s algorit...
Shuli Gao, Noureddine Chabini, Dhamin Al-Khalili, ...
CSCW
2008
ACM
13 years 11 months ago
Supporting medical conversations between deaf and hearing individuals with tabletop displays
This paper describes the design and evaluation of Shared Speech Interface (SSI), an application for an interactive multitouch tabletop display designed to facilitate medical conve...
Anne Marie Piper, James D. Hollan
ER
2008
Springer
106views Database» more  ER 2008»
13 years 11 months ago
Towards a Compositional Semantic Account of Data Quality Attributes
We address the fundamental question: what does it mean for data in a database to be of high quality? We motivate our discussion with examples, where traditional views on data quali...
Lei Jiang, Alexander Borgida, John Mylopoulos
DAGSTUHL
2008
13 years 10 months ago
Real Algebraic Numbers: Complexity Analysis and Experimentation
Abstract. We present algorithmic, complexity and implementation results concerning real root isolation of a polynomial of degree d, with integer coefficients of bit size , using S...
Ioannis Z. Emiris, Bernard Mourrain, Elias P. Tsig...