Sciweavers

4305 search results - page 91 / 861
» Analysing Protocol Implementations
Sort
View
KDD
2006
ACM
181views Data Mining» more  KDD 2006»
14 years 9 months ago
Cryptographically private support vector machines
We study the problem of private classification using kernel methods. More specifically, we propose private protocols implementing the Kernel Adatron and Kernel Perceptron learning ...
Helger Lipmaa, Sven Laur, Taneli Mielikäinen
WWIC
2007
Springer
247views Communications» more  WWIC 2007»
14 years 3 months ago
Reliable Geographical Multicast Routing in Vehicular Ad-Hoc Networks
Vehicular ad-hoc networks (VANETs) offer a large number of new potential applications without relying on significant infrastructure. Many of these applications benefit from multi-h...
Maria Kihl, Mihail L. Sichitiu, Ted Ekeroth, Micha...
ERCIMDL
2001
Springer
106views Education» more  ERCIMDL 2001»
14 years 1 months ago
Greenstone: A Platform for Distributed Digital Library Applications
Abstract. This paper examines the issues surrounding distributed Digital Library protocols. First, it reviews three prominent digital library protocols: Z39.50, SDLIP, and Dienst, ...
David Bainbridge, George Buchanan, John R. McPhers...
ACSAC
1999
IEEE
14 years 1 months ago
Towards a Practical, Secure, and Very Large Scale Online Election
We propose in this paper a practical and secure electronic voting protocol for large-scale online elections. Our protocol satisfies a large set of important criteria that has neve...
Jared Karro, Jie Wang
VMCAI
2010
Springer
14 years 6 months ago
Shape Analysis of Low-Level C with Overlapping Structures
Abstract. Device drivers often keep data in multiple data structures simultaneously while embedding list or tree related records into the records containing the actual data; this r...
Jörg Kreiker, Helmut Seidl, Vesal Vojdani