Sciweavers

516 search results - page 83 / 104
» Comparing Two Information Flow Security Properties
Sort
View
PR
2007
180views more  PR 2007»
13 years 8 months ago
Hybrid image matching combining Hausdorff distance with normalized gradient matching
Image matching has been a central problem in computer vision and image processing for decades. Most of the previous approaches to image matching can be categorized into the intens...
Chyuan-Huei Thomas Yang, Shang-Hong Lai, Long-Wen ...
IDEAS
2008
IEEE
109views Database» more  IDEAS 2008»
14 years 3 months ago
EXsum: an XML summarization framework
1 We propose a new framework for the summarization of XML document properties called EXsum (Element-wise XML summarization), which can capture statistical information of all import...
José de Aguiar Moraes Filho, Theo Härd...
USS
2008
13 years 11 months ago
The Case for Networked Remote Voting Precincts
Voting in national elections from the comfort of one's home computer may never be practical or secure, but we argue that remote network voting can be both practical and secur...
Daniel Sandler, Dan S. Wallach
IANDC
2006
77views more  IANDC 2006»
13 years 8 months ago
Lower and upper bounds on obtaining history independence
Abstract. History independent data structures, presented by Micciancio, are data structures that possess a strong security property: even if an intruder manages to get a copy of th...
Niv Buchbinder, Erez Petrank
FOIS
2006
13 years 10 months ago
Qualities in Possible Worlds
The paper analyzes how and under which assumptions it is possible to compare (in a relationist setting and relatively to qualities) entities living in different worlds. We begin wi...
Stefano Borgo, Claudio Masolo