Sciweavers

1585 search results - page 136 / 317
» Automatically optimizing secure computation
Sort
View
MIAR
2006
IEEE
14 years 2 months ago
Cerebral Vascular Tree Matching of 3D-RA Data Based on Tree Edit Distance
Abstract. In this paper, we present a novel approach to matching cerebral vascular trees obtained from 3D-RA data-sets based on minimization of tree edit distance. Our approach is ...
Tommy W. H. Tang, Albert C. S. Chung
DAC
2005
ACM
13 years 10 months ago
Multiplexer restructuring for FPGA implementation cost reduction
This paper presents a novel synthesis algorithm that reduces the area needed for implementing multiplexers on an FPGA by an average of 18%. This is achieved by reducing the number...
Paul Metzgen, Dominic Nancekievill
SP
2005
IEEE
149views Security Privacy» more  SP 2005»
14 years 1 months ago
Distributed Proving in Access-Control Systems
We present a distributed algorithm for assembling a proof that a request satisfies an access-control policy expressed in a formal logic, in the tradition of Lampson et al. [16]. ...
Lujo Bauer, Scott Garriss, Michael K. Reiter
CPA
1995
143views Cryptology» more  CPA 1995»
13 years 11 months ago
Crypto in Europe - Markets, Law and Policy
Much of the debate on cryptography has assumed that the real tension is between the state’s desire for effective policing and the privacy of the individual. We argue that this i...
Ross J. Anderson
TSE
2010
230views more  TSE 2010»
13 years 2 months ago
Vulnerability Discovery with Attack Injection
The increasing reliance put on networked computer systems demands higher levels of dependability. This is even more relevant as new threats and forms of attack are constantly being...
João Antunes, Nuno Ferreira Neves, Miguel C...