Sciweavers

2226 search results - page 315 / 446
» Computable Analysis via Representations
Sort
View
NSDI
2007
15 years 7 months ago
Information Slicing: Anonymity Using Unreliable Overlays
This paper proposes a new approach to anonymous communication called information slicing. Typically, anonymizers use onion routing, where a message is encrypted in layers with the...
Sachin Katti, Jeff Cohen, Dina Katabi
NSDI
2008
15 years 7 months ago
Passport: Secure and Adoptable Source Authentication
We present the design and evaluation of Passport, a system that allows source addresses to be validated within the network. Passport uses efficient, symmetric-key cryptography to ...
Xin Liu, Ang Li, Xiaowei Yang, David Wetherall
DAC
2005
ACM
15 years 6 months ago
Timing-driven placement by grid-warping
Grid-warping is a recent placement strategy based on a novel physical analogy: rather than move the gates to optimize their location, it elastically deforms a model of the 2-D chi...
Zhong Xiu, Rob A. Rutenbar
LREC
2010
189views Education» more  LREC 2010»
15 years 6 months ago
Constructing an Annotated Story Corpus: Some Observations and Issues
This paper discusses our ongoing work on constructing an annotated corpus of children's stories for further studies on the linguistic, computational, and cognitive aspects of...
Oi Yee Kwong
ENGL
2008
97views more  ENGL 2008»
15 years 4 months ago
Hybrid Surface Reconstruction Technique for Automotive Applications
Reverse engineering has become a viable technique to create a 3D virtual model of an existing physical object. It enables the reconstruction of body surfaces to create a suitable C...
Gregory M. Lecrivain, Ian F. Kennedy, Arezki Slaou...