Sciweavers

1626 search results - page 268 / 326
» Computing the Types of the Relationships between Autonomous ...
Sort
View
ANCS
2005
ACM
14 years 2 months ago
Framework for supporting multi-service edge packet processing on network processors
Network edge packet-processing systems, as are commonly implemented on network processor platforms, are increasingly required to support a rich set of services. These multi-servic...
Arun Raghunath, Aaron R. Kunze, Erik J. Johnson, V...
TOCS
2002
70views more  TOCS 2002»
13 years 8 months ago
Secure program partitioning
This paper presents secure program partitioning, a language-based technique for protecting confidential data during computation in distributed systems containing mutually untruste...
Steve Zdancewic, Lantian Zheng, Nathaniel Nystrom,...
TGC
2007
Springer
14 years 2 months ago
Adversaries and Information Leaks (Tutorial)
Secure information flow analysis aims to prevent programs from leaking their H (high) inputs to their L (low) outputs. A major challenge in this area is to relax the standard noni...
Geoffrey Smith
ACCV
2010
Springer
13 years 3 months ago
Randomised Manifold Forests for Principal Angle-Based Face Recognition
Abstract. In set-based face recognition, each set of face images is often represented as a linear/nonlinear manifold and the Principal Angles (PA) or Kernel PAs are exploited to me...
Ujwal D. Bonde, Tae-Kyun Kim, K. R. Ramakrishnan
WIMOB
2007
IEEE
14 years 3 months ago
Securing Virtual Private Networks with SIM Authentication
—  With the ever increasing amount of systems requiring user authentication, users are experiencing an substantial inconvenience. A huge amount of passwords needs to be remember...
Torstein Bjørnstad, Ivar Jørstad, Do...