Sciweavers

208 search results - page 19 / 42
» Computing Anonymously with Arbitrary Knowledge
Sort
View
CVPR
2000
IEEE
14 years 2 months ago
Alpha Estimation in Natural Images
Many boundaries between objects in the world project onto curves in an image. However, boundaries involving natural objects (e.g., trees, hair, water, smoke) are often unworkable ...
Mark A. Ruzon, Carlo Tomasi
INFOCOM
1997
IEEE
14 years 2 months ago
Addressing Network Survivability Issues by Finding the K-Best Paths through a Trellis Graph
Due to the increasing reliance of our society on the timely and reliable transfer of large quantities of information (suchas voice, data, and video)across high speed communication...
Stavros D. Nikolopoulos, Andreas Pitsillides, Davi...
ASIAN
2006
Springer
133views Algorithms» more  ASIAN 2006»
14 years 1 months ago
Normal Proofs in Intruder Theories
Given an arbitrary intruder deduction capability, modeled as an inference system S and a protocol, we show how to compute an inference system bS such that the security problem for ...
Vincent Bernat, Hubert Comon-Lundh
MIDDLEWARE
2009
Springer
14 years 4 months ago
Middleware for Pervasive Spaces: Balancing Privacy and Utility
Abstract. Middleware for pervasive spaces has to meet conflicting requirements. It has to both maximize the utility of the information exposed and ensure that this information doe...
Daniel Massaguer, Bijit Hore, Mamadou H. Diallo, S...
FTDCS
2004
IEEE
14 years 1 months ago
A New Perspective in Defending against DDoS
Distributed denial of service (DDoS) is a major threat to the availability of Internet services. The anonymity allowed by IP networking, together with the distributed, large scale...
Shigang Chen, Randy Chow