Sciweavers

1646 search results - page 235 / 330
» Automatic generation of two-party computations
Sort
View
DSN
2006
IEEE
14 years 1 months ago
Using Attack Injection to Discover New Vulnerabilities
Due to our increasing reliance on computer systems, security incidents and their causes are important problems that need to be addressed. To contribute to this objective, the pape...
Nuno Ferreira Neves, João Antunes, Miguel C...
ECCV
2006
Springer
14 years 1 months ago
Direct Segmentation of Multiple 2-D Motion Models of Different Types
We propose a closed form solution for segmenting mixtures of 2-D translational and 2-D affine motion models directly from the image intensities. Our approach exploits the fact that...
Dheeraj Singaraju, René Vidal
DSN
2000
IEEE
14 years 1 months ago
Survivability Analysis of Network Specifications
Survivabilityis the ability of a system to maintain a set of essential services despite the presence of abnormal events such as faults and intrusions. Ensuring system survivabilit...
Sanjay K. Jha, Jeannette M. Wing, Richard C. Linge...
CAE
2007
14 years 17 days ago
Celtic Knots Colorization based on Color Harmony Principles
This paper proposes two simple and powerful algorithms to automatically paint Celtic knots with aesthetic colors. The shape of the knot is generated from its dual graph as present...
Caroline Larboulette
BMVC
2002
14 years 17 days ago
Blending Images for Texturing 3D Models
This paper describes a novel system for building seamless texture maps for a surface of arbitrary topology from real images of the object taken with a standard digital camera and ...
Adam Baumberg