Sciweavers

148 search results - page 27 / 30
» On Perfect Completeness for QMA
Sort
View
ICICS
2003
Springer
14 years 24 days ago
ID-Based Distributed "Magic Ink" Signature from Pairings
The advantage of ID-based system is the simplification of key distribution and certification management; a user can directly use his identity as his public key instead of an arbi...
Yan Xie, Fangguo Zhang, Xiaofeng Chen, Kwangjo Kim
FAST
2008
13 years 10 months ago
Portably Solving File TOCTTOU Races with Hardness Amplification
The file-system API of contemporary systems makes programs vulnerable to TOCTTOU (time of check to time of use) race conditions. Existing solutions either help users to detect the...
Dan Tsafrir, Tomer Hertz, David Wagner, Dilma Da S...
CCS
2008
ACM
13 years 9 months ago
A practical mimicry attack against powerful system-call monitors
System-call monitoring has become the basis for many hostbased intrusion detection as well as policy enforcement techniques. Mimicry attacks attempt to evade system-call monitorin...
Chetan Parampalli, R. Sekar, Rob Johnson
ECEH
2007
133views Healthcare» more  ECEH 2007»
13 years 9 months ago
Goals and Challenges for the Realization of a European wide eHealth Infrastructure
: A number of Electronic Health Record (EHR) standards and frameworks have been developed to assist with the interoperability and integration of distributed EHR information. Ideall...
Andreas Thiel, Marco Eichelberg, Berthold B. Wein,...
ICPR
2010
IEEE
13 years 7 months ago
Incorporating Linguistic Model Adaptation into Whole-Book Recognition
Abstract—Whole-book recognition is a document image analysis strategy that operates on the complete set of a book’s page images using automatic adaptation to improve accuracy. ...
Pingping Xiu, Henry S. Baird