Sciweavers

6616 search results - page 1245 / 1324
» Can markets help
Sort
View
CTRSA
2003
Springer
116views Cryptology» more  CTRSA 2003»
14 years 2 months ago
Intrusion-Resilient Public-Key Encryption
Exposure of secret keys seems to be inevitable, and may in practice represent the most likely point of failure in a cryptographic system. Recently, the notion of intrusion-resilien...
Yevgeniy Dodis, Matthew K. Franklin, Jonathan Katz...
ICARIS
2003
Springer
14 years 2 months ago
Artificial Immune Systems and the Grand Challenge for Non-classical Computation
The UK Grand Challenges for Computing Research is an initiative to map out certain key areas that could be used to help drive research over the next 10–15 years. One of the ident...
Susan Stepney, John A. Clark, Colin G. Johnson, De...
ECCV
2010
Springer
14 years 2 months ago
The Quadratic-Chi Histogram Distance Family
We present a new histogram distance family, the Quadratic-Chi (QC). QC members are Quadratic-Form distances with a cross-bin χ2 -like normalization. The cross-bin χ2 -like normal...
ISCA
2010
IEEE
170views Hardware» more  ISCA 2010»
14 years 2 months ago
Relax: an architectural framework for software recovery of hardware faults
As technology scales ever further, device unreliability is creating excessive complexity for hardware to maintain the illusion of perfect operation. In this paper, we consider whe...
Marc de Kruijf, Shuou Nomura, Karthikeyan Sankaral...
NPAR
2010
ACM
14 years 2 months ago
Detail-preserving paint modeling for 3D brushes
Recent years have witnessed significant advances in 3D brush modeling and simulation in digital paint tools. Compared with traditional 2D brushes, a 3D brush can be both more intu...
Nelson Siu-Hang Chu, William Baxter, Li-Yi Wei, Na...
« Prev « First page 1245 / 1324 Last » Next »