Sciweavers

1087 search results - page 175 / 218
» Distributed Oblivious Transfer
Sort
View
FC
2005
Springer
87views Cryptology» more  FC 2005»
14 years 2 months ago
Protecting Secret Data from Insider Attacks
We consider defenses against confidentiality and integrity attacks on data following break-ins, or so-called intrusion resistant storage technologies. We investigate the problem o...
David Dagon, Wenke Lee, Richard J. Lipton
GCC
2005
Springer
14 years 2 months ago
The Architecture of SIG Computing Environment and Its Application to Image Processing
Spatial Information Grid (SIG) is a project of applying grid technology to share and integrate spatial data resources, information processing resources, equipment resources, and kn...
Chunhui Yang, Deke Guo, Yan Ren, Xueshan Luo, Jinf...
ICCS
2005
Springer
14 years 2 months ago
Integrating Fire, Structure and Agent Models
Abstract. A state-of-the-art integrated environment was created to study interaction among fire, structure and agent models in a fire evacuation from a typical office building. For...
Alok R. Chaturvedi, S. A. Filatyev, J. P. Gore, A....
NOSSDAV
2005
Springer
14 years 2 months ago
1-800-OVERLAYS: using overlay networks to improve VoIP quality
The cost savings and novel features associated with Voice over IP (VoIP) are driving its adoption by service providers. Such a transition however can successfully happen only if t...
Yair Amir, Claudiu Danilov, Stuart Goose, David He...
VISUAL
2005
Springer
14 years 2 months ago
Compressed Domain Image Retrieval Using JPEG2000 and Gaussian Mixture Models
We describe and compare three probabilistic ways to perform Content Based Image Retrieval (CBIR) in compressed domain using images in JPEG2000 format. Our main focus are arbitrary ...
Alexandra Teynor, Wolfgang Müller, Wolfgang L...