Sciweavers

1116 search results - page 159 / 224
» Key Agreement Using Statically Keyed Authenticators
Sort
View
PLDI
2006
ACM
14 years 1 months ago
SAFECode: enforcing alias analysis for weakly typed languages
Static analysis of programs in weakly typed languages such as C and C++ is generally not sound because of possible memory errors due to dangling pointer references, uninitialized ...
Dinakar Dhurjati, Sumant Kowshik, Vikram S. Adve
PKC
2012
Springer
255views Cryptology» more  PKC 2012»
11 years 10 months ago
Better Bootstrapping in Fully Homomorphic Encryption
Gentry’s bootstrapping technique is currently the only known method of obtaining a “pure” fully homomorphic encryption (FHE) schemes, and it may offers performance advantage...
Craig Gentry, Shai Halevi, Nigel P. Smart
IASTEDSEA
2004
13 years 9 months ago
Erroneous architecture is a relative concept
The problem this paper addresses is that an architecture formed of software components can contain composition errors (introduced, for instance, as a result of the choice of afram...
Jirí Adámek, Frantisek Plasil
ICIP
2006
IEEE
14 years 9 months ago
Efficient Object-Based Video Inpainting
Video inpainting is the process of repairing missing regions (holes) in videos. Most automatic techniques are computationally intensive and unable to repair large holes. To tackle...
Sen-Ching S. Cheung, Jian Zhao, M. Vijay Venkatesh
KDD
2006
ACM
176views Data Mining» more  KDD 2006»
14 years 8 months ago
A framework for analysis of dynamic social networks
Finding patterns of social interaction within a population has wide-ranging applications including: disease modeling, cultural and information transmission, and behavioral ecology...
Tanya Y. Berger-Wolf, Jared Saia