Sciweavers

4690 search results - page 851 / 938
» An operational semantics for Scheme
Sort
View
CCS
2006
ACM
14 years 25 days ago
Safety and consistency in policy-based authorization systems
In trust negotiation and other distributed proving systems, networked entities cooperate to form proofs that are justified by collections of certified attributes. These attributes...
Adam J. Lee, Marianne Winslett
CCS
2001
ACM
14 years 22 days ago
A verifiable secret shuffle and its application to e-voting
We present a mathematical construct which provides a cryptographic protocol to verifiably shuffle a sequence of k modular integers, and discuss its application to secure, universa...
C. Andrew Neff
CCS
2008
ACM
13 years 11 months ago
Efficient security primitives derived from a secure aggregation algorithm
By functionally decomposing a specific algorithm (the hierarchical secure aggregation algorithm of Chan et al. [3] and Frikken et al. [7]), we uncover a useful general functionali...
Haowen Chan, Adrian Perrig
MVA
2007
186views Computer Vision» more  MVA 2007»
13 years 10 months ago
License Plate Recognition from Low-Quality Videos
This paper presents a novel hybrid method for extracting license plates and recognizing characters from low-quality videos using morphological operations and Adaboost algorithm. F...
Chih-Chiang Chen, Jun-Wei Hsieh
SIGMETRICS
2010
ACM
217views Hardware» more  SIGMETRICS 2010»
13 years 9 months ago
Optimal recovery of single disk failure in RDP code storage systems
Modern storage systems use thousands of inexpensive disks to meet the storage requirement of applications. To enhance the data availability, some form of redundancy is used. For e...
Liping Xiang, Yinlong Xu, John C. S. Lui, Qian Cha...