Sciweavers

34181 search results - page 6779 / 6837
» The Computer System GRAPHOGRAPH
Sort
View
EUROCRYPT
1990
Springer
14 years 1 months ago
Experimental Quantum Cryptography
We describe results from an apparatus and protocol designed to implement quantum key distribution, by which two users, who share no secret information initially: 1) exchange a ran...
Charles H. Bennett, François Bessette, Gill...
ACMICEC
2007
ACM
115views ECommerce» more  ACMICEC 2007»
14 years 1 months ago
An economic model of portal competition under privacy concerns
Due to inherent privacy concerns, online personalization services such as those offered through toolbars and desktop widgets are characterized by "no-free-disposal" (NFD...
Ramnath K. Chellappa, Raymond G. Sin
ASPLOS
2009
ACM
14 years 1 months ago
Accelerating phase unwrapping and affine transformations for optical quadrature microscopy using CUDA
Optical Quadrature Microscopy (OQM) is a process which uses phase data to capture information about the sample being studied. OQM is part of an imaging framework developed by the ...
Perhaad Mistry, Sherman Braganza, David R. Kaeli, ...
ASSETS
2007
ACM
14 years 1 months ago
Variable frame rate for low power mobile sign language communication
The MobileASL project aims to increase accessibility by enabling Deaf people to communicate over video cell phones in their native language, American Sign Language (ASL). Real-tim...
Neva Cherniavsky, Anna Cavender, Richard E. Ladner...
CCS
2007
ACM
14 years 1 months ago
Highly efficient techniques for network forensics
Given a history of packet transmissions and an excerpt of a possible packet payload, the payload attribution problem requires the identification of sources, destinations and the t...
Miroslav Ponec, Paul Giura, Hervé Brön...
« Prev « First page 6779 / 6837 Last » Next »