Sciweavers

401 search results - page 35 / 81
» Delegatable Functional Signatures
Sort
View
ICS
2010
Tsinghua U.
14 years 5 months ago
Proof-Carrying Data and Hearsay Arguments from Signature Cards
: Design of secure systems can often be expressed as ensuring that some property is maintained at every step of a distributed computation among mutually-untrusting parties. Special...
Alessandro Chiesa, Eran Tromer
IH
1999
Springer
13 years 12 months ago
Hiding Signatures in Graph Coloring Solutions
Abstract. One way to protect a digital product is to embed an author's signature into the object in the form of minute errors. However, this technique cannot be directly appli...
Gang Qu, Miodrag Potkonjak
ISSTA
2009
ACM
14 years 2 months ago
Identifying bug signatures using discriminative graph mining
Bug localization has attracted a lot of attention recently. Most existing methods focus on pinpointing a single statement or function call which is very likely to contain bugs. Al...
Hong Cheng, David Lo, Yang Zhou, Xiaoyin Wang, Xif...
JMIV
2010
106views more  JMIV 2010»
13 years 2 months ago
Parametric Estimation of Affine Transformations: An Exact Linear Solution
Abstract We consider the problem of estimating the geometric deformation of an object, with respect to some reference observation on it. Existing solutions, set in the standard coo...
Rami Hagege, Joseph M. Francos
ICA
2007
Springer
14 years 1 months ago
Mutual Interdependence Analysis (MIA)
Functional Data Analysis (FDA) is used for datasets that are more meaningfully represented in the functional form. Functional principal component analysis, for instance, is used to...
Heiko Claussen, Justinian Rosca, Robert I. Damper