Sciweavers

3121 search results - page 489 / 625
» Information Survivability Control Systems
Sort
View
POPL
2008
ACM
16 years 4 months ago
Cryptographically sound implementations for typed information-flow security
In language-based security, confidentiality and integrity policies conveniently specify the permitted flows of information between different parts of a program with diverse levels...
Cédric Fournet, Tamara Rezk
CCS
2007
ACM
15 years 10 months ago
How much anonymity does network latency leak?
Low-latency anonymity systems such as Tor, AN.ON, Crowds, and Anonymizer.com aim to provide anonymous connections that are both untraceable by “local” adversaries who control ...
Nicholas Hopper, Eugene Y. Vasserman, Eric Chan-Ti...
ACL
1998
15 years 5 months ago
Learning Intonation Rules for Concept to Speech Generation
In this paper, we report on an effort to provide a general-purpose spoken language generation tool for Concept-to-Speech (CTS) applications by extending a widely used text generat...
Shimei Pan, Kathleen McKeown
TVCG
2008
173views more  TVCG 2008»
15 years 4 months ago
Sinus Endoscopy - Application of Advanced GPU Volume Rendering for Virtual Endoscopy
For difficult cases in endoscopic sinus surgery, a careful planning of the intervention is necessary. Due to the reduced field of view during the intervention, the surgeons have le...
Arno Krüger, Christoph Kubisch, Gero Strau&sz...
IHI
2010
160views Healthcare» more  IHI 2010»
14 years 11 months ago
Securing the e-health cloud
Modern information technology is increasingly used in healthcare with the goal to improve and enhance medical services and to reduce costs. In this context, the outsourcing of com...
Hans Löhr, Ahmad-Reza Sadeghi, Marcel Winandy