Sciweavers

1775 search results - page 268 / 355
» Antichains on Three Levels
Sort
View
PVLDB
2010
121views more  PVLDB 2010»
13 years 8 months ago
Personalized Privacy Protection in Social Networks
Due to the popularity of social networks, many proposals have been proposed to protect the privacy of the networks. All these works assume that the attacks use the same background...
Mingxuan Yuan, Lei Chen 0002, Philip S. Yu
TMI
2010
128views more  TMI 2010»
13 years 8 months ago
Segmentation of the Outer Vessel Wall of the Common Carotid Artery in CTA
—A novel method is presented for carotid artery vessel wall segmentation in computed tomography angiography (CTA) data. First the carotid lumen is semi-automatically segmented us...
Danijela Vukadinovic, Theo van Walsum, Rashindra M...
TON
2010
141views more  TON 2010»
13 years 8 months ago
Weighted spectral distribution for internet topology analysis: theory and applications
Abstract—Comparing graphs to determine the level of underlying structural similarity between them is a widely encountered problem in computer science. It is particularly relevant...
Damien Fay, Hamed Haddadi, Andrew Thomason, Andrew...
TOPLAS
2010
101views more  TOPLAS 2010»
13 years 8 months ago
Nomadic pict: Programming languages, communication infrastructure overlays, and semantics for mobile computation
Pict project. We define two levels of abstraction as calculi with precise semantics: a low-level Nomadic π calculus with migration and location-dependent communication, and a hig...
Peter Sewell, Pawel T. Wojciechowski, Asis Unyapot...
ASIACRYPT
2010
Springer
13 years 8 months ago
Random Oracles with(out) Programmability
This paper investigates the Random Oracle Model (ROM) feature known as programmability, which allows security reductions in the ROM to dynamically choose the range points of an ide...
Marc Fischlin, Anja Lehmann, Thomas Ristenpart, Th...