Sciweavers

1898 search results - page 237 / 380
» Weak Keys for IDEA
Sort
View
WMCSA
2009
IEEE
14 years 4 months ago
Planning ahead: techniques for simplifying mobile service use
Interacting with mobile applications and services remains difficult for users because of the impact of mobility on both device capabilities and the cognitive resources of users. I...
Michael Harding, Oliver Storz, Nigel Davies, Adria...
NDSS
2009
IEEE
14 years 4 months ago
Two-Party Computation Model for Privacy-Preserving Queries over Distributed Databases
Many existing privacy-preserving techniques for querying distributed databases of sensitive information do not scale for large databases due to the use of heavyweight cryptographi...
Sherman S. M. Chow, Jie-Han Lee, Lakshminarayanan ...
ICNP
2009
IEEE
14 years 4 months ago
Accurate Clock Synchronization for IEEE 802.11-Based Multi-Hop Wireless Networks
—Clock synchronization is an essential building block for many control mechanisms used in wireless networks, including frequency hopping, power management, and packet scheduling....
Jui-Hao Chiang, Tzi-cker Chiueh
ICRA
2009
IEEE
137views Robotics» more  ICRA 2009»
14 years 4 months ago
Continuous vocal imitation with self-organized vowel spaces in Recurrent Neural Network
Abstract— A continuous vocal imitation system was developed using a computational model that explains the process of phoneme acquisition by infants. Human infants perceive speech...
Hisashi Kanda, Tetsuya Ogata, Toru Takahashi, Kazu...
ICRA
2009
IEEE
121views Robotics» more  ICRA 2009»
14 years 4 months ago
Learning sequential visual attention control through dynamic state space discretization
² Similar to humans and primates, artificial creatures like robots are limited in terms of allocation of their resources to huge sensory and perceptual information. Serial process...
Ali Borji, Majid Nili Ahmadabadi, Babak Nadjar Ara...