767 Hits in 11.3 sec

Quantum-Computation and Applications

Bhupesh Bishnoi
2020 Zenodo  
from atoms to photons, using semiconductors and superconductors.  ...  We will describe a substantial difference between quantum and classical computation paradigm.  ...  In this way, quantum mechanics enables two parties to communicate securely.  ... 
doi:10.5281/zenodo.3890151 fatcat:4odapjgxcjavpchup27642mhtu

Affective Brain-Computer Interfaces [chapter]

Rafael Calvo, Sidney D'Mello, Jonathan Gratch, Arvid Kappas, Christian Mühl, Dirk Heylen, Anton Nijholt
2015 The Oxford Handbook of Affective Computing  
The workshop explored the advantages and limitations of using neurophysiological signals as a modality for the automatic recognition of affective and cognitive states, and the possibilities of using this  ...  and affective BCI In this workshop researchers from the communities of brain computer interfacing, affective computing, neuroergonomics, affective and cognitive neuroscience have been asked to present  ...  The Virtual Guide responds using spoken language and gestures, and can also show things on the map.  ... 
doi:10.1093/oxfordhb/9780199942237.013.024 fatcat:oia3yvk7hbf7ta6magl6bzjx6u

A Trust Framework for Peer-to-Peer Interaction in Ad Hoc Networks

Javesh Boodnah, Stefan Poslad
2009 2009 Computation World: Future Computing, Service Computation, Cognitive, Adaptive, Content, Patterns  
School of Electronics and Computer Science Doctor of Philosophy by Javesh Boodnah As a wider public is increasingly adopting mobile devices with diverse applications, the idea of who to trust while on  ...  The end result is a trust framework that fully meets the basic requirements for a sustainable model of trust that can be developed onto an ad hoc network and that provides enhancements in efficiency (using  ...  This can be fully configurable depending on the application in use and how fast convergence is required.  ... 
doi:10.1109/computationworld.2009.62 fatcat:vtoz27ksj5aqvpesmjei5by5ju

Proceedings of the Sixth Danish Human-Computer Interaction Research Symposium

Olav Bertelsen, Martin Brynskov, P. Dalsgaard, Ole Sejer Iversen, Marianne Graves Petersen, M. Wetterstrand
2006 DAIMI Report Series  
<p>Proceedings of the</p><p>Sixth Danish Human-Computer Interaction Research Symposium.</p><p>Aarhus, Denmark, November 15, 2006</p>  ...  ACKNOWLEDGMENTS I thank Michel Beaudoin-Lafon, Susanne Bødker, Christina Brodersen and Bent Guldbjerg Christensen for valuable input and discussions.  ...  funded project "Experience-oriented applications of digital technologies for marketing and knowledge dissemination".  ... 
doi:10.7146/dpb.v35i580.7139 fatcat:iipznsmu5fd4lmoekpa23ygk2i

Computer and Information Science, Vol. 3, No. 1, February, 2010

Editor CIS
2010 Computer and Information Science  
A Knowledge Innovation Algorithm Based on Granularity  ...  Computing communities in large networks using random walks.  ...  Each site in a multi-master replication environment is a master site, and each site communicates with the other master sites.  ... 
doi:10.5539/cis.v3n1p0 fatcat:lest4lycincrhb3aojneniqgci

Cost- and QoS-Efficient Serverless Cloud Computing [article]

Chavit Denninnart
2020 arXiv   pre-print
We employed approximate computing to reduce the pruning mechanism's computational overheads and ensure that the mechanism can be used practically.  ...  minimally affected.  ...  [SJLM14] proposed a system that identifies potentially computationally reuseable tasks and uses them for software-only approximate computation (i.e., reusing the computations that would give close  ... 
arXiv:2011.11711v1 fatcat:ra66iigninem7gqibmivsn3dba

A Survey on Modality Characteristics, Performance Evaluation Metrics, and Security for Traditional and Wearable Biometric Systems [article]

Aditya Sundararajan, Arif I. Sarwat, Alexander Pons
2019 arXiv   pre-print
To bridge the gap, this paper accordingly reviews and compares the key characteristics of modalities, contrasts the metrics used to evaluate system performance, and highlights the divergence in critical  ...  While the current literature is cognizant of those differences, there is no effective work that summarizes the factors where TBS and WBS differ, namely, their modality characteristics, performance, security  ...  Biometric cryptosystems, which generate a helper data using a secret key and biometric features, may also be used to prevent MITM attacks [206] .  ... 
arXiv:1903.02548v1 fatcat:mkl32giawnb5lgornzq4w3ec74

The Dialogic Classroom: Teachers Integrating Computer Technology, Pedagogy, and Research

Jeffrey R. Galin, Joan Latchaw
1999 College composition and communication  
far-reaching that they threaten to paralyze us with fear and inaction.  ...  continuing destruction of global ecosystems, the epidemic spread of AIDS and other diseases, terrorism, war, racism, homophobia, the impotence of political leaders and the irrelevance of political parties  ...  ), introduced the idea of using local-area computer networks to teach writing in a real-time, online environment.  ... 
doi:10.2307/359048 fatcat:6vapcmkhw5ga3lsi53ymisgzti

Blockchains for Spectrum Management in Wireless Networks: A Survey [article]

Matthew K. Luka, Okpo U. Okereke, Elijah E. Omizegba, Ejike C. Anene
2021 arXiv   pre-print
The review covers the use of blockchain to record spectrum management information such as spectrum sensing results and spectrum auction transactions in a secure manner.  ...  However, the use of spectrum database and cognitive radio techniques faces reliability, security and privacy concerns for spectrum sharing.  ...  A cached smart contract concept is used for fast and paid access to the RAN.  ... 
arXiv:2107.01005v1 fatcat:mffdg3acxbhr3k45fgkqso5f5i

Distributed SIP conference management with autonomously authenticated sources and its application to an H.264 videoconferencing software for mobiles

Thomas C. Schmidt, Gabriel Hege, Matthias Wählisch, Hans L. Cycon, Mark Palkow, Detlev Marpe
2010 Multimedia tools and applications  
The design of conferencing systems for achieving efficient and flexible communication in a fully distributed, infrastructure-independent fashion is a promising direction, both in terms of research and  ...  In the particular case of video communication, the seamless adaptation to heterogeneous mobile devices poses an additional strong challenge to those seeking for interoperable and easy-to-deploy solutions  ...  We thus use a full mesh topology here as the favorable approach to mid-size multi-party conversations.  ... 
doi:10.1007/s11042-010-0500-8 fatcat:7cqg25go5baqnimas2gt2dkz3u

3D graphics on the web: A survey

Alun Evans, Marco Romeo, Arash Bahrehmand, Javi Agenjo, Josep Blat
2014 Computers & graphics  
Following on from the advent of the X3D standard and the definition of a declarative approach to presenting 3D graphics on the web, the rise of WebGL has allowed lower level access to graphics hardware  ...  In parallel, remote rendering techniques permit streaming of high-quality 3D graphics onto a wide range of devices, and recent years have also seen much research on methods of content delivery for web-based  ...  This allows to use the atlas images for multi-resolution, and fast rendering using simple mip-map operations. Limper et al.  ... 
doi:10.1016/j.cag.2014.02.002 fatcat:3gicnpzrprafrnzy4qk7ljuxqq

Random Number Generation [chapter]

2013 An Introduction to Statistical Computing  
Wherein another serious problem which besets software-based security systems, the lack of secure random numbers, is addressed.  ...  inside other functions in a security module so that even careless programmers will (unknowingly) perform fast polls at some point.  ...  , where "Everyone" means "Everyone on the local network", not just the local machine.  ... 
doi:10.1002/9781118728048.ch1 fatcat:7do37mti6ve6vil3slewcedhx4

The internet in everyday life: Computer networking from the standpoint of the domestic user

M. Bakardjieva, R. Smith
2001 New Media & Society  
as the positioning of the computer with the Intemet connection in the middle of a shared and multi-fwictional domestic space, suggested a possible style of use anchored in the value of spousal equity  ...  Writing letters, word processing. 1 did some work in security business for a while, 1 did the basicsselling security products iike cameras. So 1 did bookkeeping and record keeping.  ...  Materials (including tapes and notes) will be held at a secure location and will be destroyed after the completion of the study. The details of these procedures are negotiable.  ... 
doi:10.1177/14614440122225994 fatcat:7okeavmjxbbwpkvvnnl5qmhlka

D1.1 - State of the Art Analysis

Danilo Ardagna
2021 Zenodo  
The aim of the AI-SPRINT "Artificial intelligence in Secure PRIvacy-preserving computing coNTinuum" project is to develop a platform composed of design and runtime management tools to seamlessly design  ...  The aim of this deliverable is to review the state-of-the-art in techniques used in the development and operation of AI applications in computing continua and the related technologies.  ...  It implements secure computation protocols based on homomorphic encryption and multi-party computation (MPC).  ... 
doi:10.5281/zenodo.6372377 fatcat:f6ldfuwivbcltew4smiiwphfty

Category Definitions [chapter]

Dean F. Sittig
2017 Clinical Informatics Literacy  
Analog computer Application service provider ( Computer Networking The use of computers and associated hardware to create a telecommunications network that can be used to facilitate the exchange of  ...  Blended Human-Computer Interaction A subfield of computer science that focuses on the design and use of computing technology that provides the interface between computing technology and the people who  ...  They are most valuable when they are used to screen for diseases that are both serious and treatable, so that there is a benefit to detecting the disease before symptoms begin at their most treatable stages  ... 
doi:10.1016/b978-0-12-803206-0.00001-8 fatcat:ts57p4xi2nflrpo4j5jthqov4u
« Previous Showing results 1 — 15 out of 767 results