Sciweavers

536 search results - page 46 / 108
» paste 2010
Sort
View
TPDS
2010
113views more  TPDS 2010»
13 years 3 months ago
Highly Available Intrusion-Tolerant Services with Proactive-Reactive Recovery
In the past, some research has been done on how to use proactive recovery to build intrusion-tolerant replicated systems that are resilient to any number of faults, as long as reco...
Paulo Sousa, Alysson Neves Bessani, Miguel Correia...
WH
2010
170views Healthcare» more  WH 2010»
13 years 3 months ago
Towards power optimized kalman filter for gait assessment using wearable sensors
Systems with wearable and wireless motion sensors have been receiving significant attention in the past few years specifically for the applications of human movement monitoring. O...
Prem Santosh Udaya Shankar, Nikhil Raveendranathan...
ICS
2010
Tsinghua U.
14 years 6 months ago
Cryptography by Cellular Automata or How Fast Can Complexity Emerge in Nature?
Computation in the physical world is restricted by the following spatial locality constraint: In a single unit of time, information can only travel a bounded distance in space. A ...
Benny Applebaum, Yuval Ishai, Eyal Kushilevitz
UM
2010
Springer
14 years 18 days ago
Ranking Feature Sets for Emotion Models Used in Classroom Based Intelligent Tutoring Systems
Abstract. Recent progress has been made by using sensors with Intelligent Tutoring Systems in classrooms in order to predict the affective state of students users. If tutors are a...
David G. Cooper, Kasia Muldner, Ivon Arroyo, Bever...
FC
2010
Springer
205views Cryptology» more  FC 2010»
14 years 17 days ago
On Robust Key Agreement Based on Public Key Authentication
—This paper discusses public-key authenticated key agreement protocols. First, we critically analyze several authenticated key agreement protocols and uncover various theoretical...
Feng Hao