Sciweavers

34202 search results - page 6642 / 6841
» The Tera computer system
Sort
View
PAIRING
2010
Springer
155views Cryptology» more  PAIRING 2010»
13 years 7 months ago
Identification of Multiple Invalid Pairing-Based Signatures in Constrained Batches
Abstract. This paper describes a new method in pairing-based signature schemes for identifying the invalid digital signatures in a batch after batch verification has failed. The me...
Brian J. Matt
UM
2010
Springer
13 years 7 months ago
Mobile Web Profiling: A Study of Off-Portal Surfing Habits of Mobile Users
Abstract. The World Wide Web has provided users with the opportunity to access from any computer the largest set of information ever existing. Researchers have analyzed how such us...
Daniel Olmedilla, Enrique Frías-Martí...
VRST
2010
ACM
13 years 7 months ago
Region-of-interest volumetric visual hull refinement
This paper introduces a region-of-interest visual hull refinement technique, based on flexible voxel grids for volumetric visual hull reconstructions. Region-of-interest refinemen...
Daniel Knoblauch, Falko Kuester
WICON
2010
13 years 7 months ago
Resource Allocation and Reuse for Inter-cell Interference Mitigation in OFDMA based Communication Networks
Inter-cell interference (ICI) mitigation is always a big challenge issue in cellular systems. In this work we propose an Enhanced Fractional Frequency Reuse (EFFR) scheme with an i...
Zheng Xie, Bernhard Walke
CANDC
2009
ACM
13 years 7 months ago
Designing to support reasoned imagination through embodied metaphor
Supporting users' reasoned imagination in sense making during interaction with tangible and embedded computation involves supporting the application of their existing mental ...
Alissa Nicole Antle, Greg Corness, Saskia Bakker, ...
« Prev « First page 6642 / 6841 Last » Next »