Sciweavers

3732 search results - page 716 / 747
» Ubiquitous Computing for the Public
Sort
View
EUROCRYPT
2010
Springer
14 years 2 months ago
Algebraic Cryptanalysis of McEliece Variants with Compact Keys
In this paper we propose a new approach to investigate the security of the McEliece cryptosystem. We recall that this cryposystem relies on the use of error-correcting codes. Since...
Jean-Charles Faugère, Ayoub Otmani, Ludovic...
GROUP
2009
ACM
14 years 2 months ago
Probing the potential of non-verbal group communication
Designing for non-verbal communication using e.g. gestures and other bodily expressions is difficult. Hardware and software need to be co-designed and harmonize in order to not th...
Petra Sundström, Tove Jaensson, Kristina H&ou...
VLDB
2001
ACM
109views Database» more  VLDB 2001»
14 years 2 months ago
Analyzing energy behavior of spatial access methods for memory-resident data
The proliferation of mobile and pervasive computing devices has brought energy constraints into the limelight, together with performance considerations. Energy-conscious design is...
Ning An, Anand Sivasubramaniam, Narayanan Vijaykri...
SIGCOMM
2000
ACM
14 years 2 months ago
Delayed internet routing convergence
This paper examines the latency in Internet path failure, failover and repair due to the convergence properties of interdomain routing. Unlike switches in the public telephony net...
Craig Labovitz, Abha Ahuja, Abhijit Bose, Farnam J...
WCRE
1999
IEEE
14 years 1 months ago
Experiments with Clustering as a Software Remodularization Method
As valuable software systems get old, reverse engineering becomes more and more important to the companies that have to maintain the code. Clustering is a key activity in reverse ...
Nicolas Anquetil, Timothy Lethbridge