Sciweavers

143 search results - page 18 / 29
» A Range Test Secure in the Active Adversary Model
Sort
View
JCIT
2008
154views more  JCIT 2008»
13 years 8 months ago
A Multi-Agent Framework for Testing 3-Tier Distributed Systems Architecture
Lack of time and capital for software testing is an oft encountered problem in most organizations. The plethora of possible test cases for each software component makes software t...
Sunitha Ramanujam, Hany F. El Yamany, Miriam A. M....
CRYPTO
2012
Springer
277views Cryptology» more  CRYPTO 2012»
11 years 11 months ago
Multiparty Computation from Somewhat Homomorphic Encryption
We propose a general multiparty computation protocol secure against an active adversary corrupting up to n−1 of the n players. The protocol may be used to compute securely arithm...
Ivan Damgård, Valerio Pastro, Nigel P. Smart...
IPPS
2007
IEEE
14 years 2 months ago
A Framework for Modeling Operating System Mechanisms in the Simulation of Network Protocols for Real-Time Distributed Systems
In this paper we present a software tool for the simulation of distributed real-time embedded systems. Our tool is based on the popular NS-2 package for simulating the networking ...
Paolo Pagano, Prashant Batra, Giuseppe Lipari
ICRA
2008
IEEE
117views Robotics» more  ICRA 2008»
14 years 3 months ago
Kinematics and calibration of active cannulas
Abstract— Active cannulas are remotely actuated thin continuum robots with the potential to traverse narrow and winding environments without relying on “guiding” environmenta...
Robert J. Webster III, Joseph M. Romano, Noah J. C...
IMC
2009
ACM
14 years 3 months ago
ANTIDOTE: understanding and defending against poisoning of anomaly detectors
Statistical machine learning techniques have recently garnered increased popularity as a means to improve network design and security. For intrusion detection, such methods build ...
Benjamin I. P. Rubinstein, Blaine Nelson, Ling Hua...