Motivated by the question of basing cryptographic protocols on stateless tamper-proof hardware tokens, we revisit the question of unconditional two-prover zero-knowledge proofs fo...
Vipul Goyal, Yuval Ishai, Mohammad Mahmoody, Amit ...
Background: Sub-cellular structures interact in numerous direct and indirect ways in order to fulfill cellular functions. While direct molecular interactions crucially depend on s...
Model-based approaches for interactive Web applications have neglected vocal interaction. However, ubiquitous multi-device environments call for better support for such modality. I...
Abstract. In this paper we present a novel approach to visualize irregularly occurring events. We introduce the event line view designed specifically for such events data (a subset...
Kresimir Matkovic, Alan Lez, Denis Gracanin, Andre...
Many approaches have been proposed to connect mobile phones with interactive tables. Most rely on having the phone placed on table all times, which may hinder the overall user exp...