Sciweavers

494 search results - page 52 / 99
» Ballot mark detection
Sort
View
FDTC
2006
Springer
102views Cryptology» more  FDTC 2006»
14 years 1 months ago
Non-linear Residue Codes for Robust Public-Key Arithmetic
We present a scheme for robust multi-precision arithmetic over the positive integers, protected by a novel family of non-linear arithmetic residue codes. These codes have a very hi...
Gunnar Gaubatz, Berk Sunar, Mark G. Karpovsky
ARC
2010
Springer
186views Hardware» more  ARC 2010»
14 years 1 months ago
Application-Specific Signatures for Transactional Memory in Soft Processors
As reconfigurable computing hardware and in particular FPGA-based systems-on-chip comprise an increasing number of processor and accelerator cores, supporting sharing and synchroni...
Martin Labrecque, Mark Jeffrey, J. Gregory Steffan
BIOCOMP
2009
13 years 11 months ago
Analysis of Long Branch Extraction
Long branch attraction is a problem that afflicts phylogenetic methods and a procedure to detect a data set suffering from this problem is the long branch extraction method[1]. Thi...
Timothy O'Connor, Kenneth Sundberg, Hyrum Carroll,...
SOCIALCOM
2010
13 years 7 months ago
Finding Overlapping Communities in Social Networks
Increasingly, methods to identify community structure in networks have been proposed which allow groups to overlap. These methods have taken a variety of forms, resulting in a lack...
Mark K. Goldberg, Stephen Kelley, Malik Magdon-Ism...
IJSSE
2010
121views more  IJSSE 2010»
13 years 7 months ago
Retrofitting Existing Web Applications with Effective Dynamic Protection Against SQL Injection Attacks
This paper presents an approach for retrofitting existing web applications with runtime protection against known as well as unseen SQL injection attacks (SQLIAs) without the invol...
San-Tsai Sun, Konstantin Beznosov