Sciweavers

122 search results - page 11 / 25
» The First Report on Scheme Revisited
Sort
View
CCR
2004
168views more  CCR 2004»
13 years 8 months ago
Coping with irregular spatio-temporal sampling in sensor networks
Wireless sensor networks have attracted attention from a diverse set of researchers, due to the unique combination of distributed, resource and data processing constraints. Howeve...
Deepak Ganesan, Sylvia Ratnasamy, Hanbiao Wang, De...
WWW
2001
ACM
14 years 9 months ago
XML Query Forms (XQForms): Declarative Specification of XML Query Interfaces
XQForms is the first generator of Web-based query forms and reports for XML data. XQForms takes as input (i) XML Schemas that model the data to be queried and presented, (ii) decl...
Michalis Petropoulos, Vasilis Vassalos, Yannis Pap...
EUROCRYPT
2000
Springer
14 years 18 days ago
Security Aspects of Practical Quantum Cryptography
The use of quantum bits (qubits) in cryptography holds the promise of secure cryptographic quantum key distribution schemes. Unfortunately, the implemented schemes are often operat...
Gilles Brassard, Norbert Lütkenhaus, Tal Mor,...
SOUPS
2010
ACM
14 years 27 days ago
Usably secure, low-cost authentication for mobile banking
This paper explores user authentication schemes for banking systems implemented over mobile phone networks in the developing world. We analyze an authentication scheme currently d...
Saurabh Panjwani, Edward Cutrell
PR
2008
146views more  PR 2008»
13 years 9 months ago
Retrieval of machine-printed Latin documents through Word Shape Coding
This paper reports a document retrieval technique that retrieves machine-printed Latin-based document images through word shape coding. Adopting the idea of image annotation, a wo...
Shijian Lu, Chew Lim Tan