Sciweavers

294 search results - page 7 / 59
» Efficient Confirmer Signatures from the
Sort
View
ICS
2010
Tsinghua U.
14 years 7 months ago
Proof-Carrying Data and Hearsay Arguments from Signature Cards
: Design of secure systems can often be expressed as ensuring that some property is maintained at every step of a distributed computation among mutually-untrusting parties. Special...
Alessandro Chiesa, Eran Tromer
ICIP
2009
IEEE
14 years 11 months ago
Principal Moments For Efficient Representation Of 2d Shape
The analytic signature is a recently proposed 2D shape representation scheme. It is tailored to the representation of shapes described by arbitrary sets of unlabeled points, or la...
ICIP
2000
IEEE
14 years 11 months ago
Efficient Video Similarity Measurement and Search
We consider the use of meta-data and/or video-domain methods to detect similar videos on the web. Meta-data is extracted from the textual and hyperlink information associated with...
Sen-Ching S. Cheung, Avideh Zakhor
JSW
2008
164views more  JSW 2008»
13 years 9 months ago
Constraint-based Trend Template for Intrusion Detection
Intrusion detection systems (IDS) are special computer security tools which help detect intrusion attempts. Misuse based detection is one of the techniques which is used by IDS to ...
Md. Ahsan Habib, Krisna Prasad Pawdel, Mohammad Ra...
BROADNETS
2004
IEEE
14 years 1 months ago
Decoupling Packet Loss from Blocking in Proactive Reservation-Based Switching
We consider the maximization of network throughput in buffer-constrained optical networks using aggregate bandwidth allocation and reservation-based transmission control. Assuming...
Mahmoud Elhaddad, Rami G. Melhem, Taieb Znati