Sciweavers

347 search results - page 56 / 70
» On private computation in incomplete networks
Sort
View
ICPR
2000
IEEE
14 years 8 months ago
A Parallel Algorithm for Tracking of Segments in Noisy Edge Images
We present a parallel implementation of a probabilistic algorithm for real time tracking of segments in noisy edge images. Given an initial solution ?a set of segments that reason...
Pedro E. López-de-Teruel, Alberto Ruiz, Jos...
HIP
2005
Springer
208views Cryptology» more  HIP 2005»
14 years 1 months ago
Phish and HIPs: Human Interactive Proofs to Detect Phishing Attacks
In this paper, we propose a new class of Human Interactive Proofs (HIPs) that allow a human to distinguish one computer from another. Unlike traditional HIPs, where the computer is...
Rachna Dhamija, J. D. Tygar
HPDC
1998
IEEE
13 years 12 months ago
Personal Tele-Immersion Devices
The Electronic Visualization Laboratory (EVL) at the University of Illinois at Chicago (UIC) has partnered with dozens of computational scientists and engineers to create visualiz...
Thomas A. DeFanti, Daniel J. Sandin, Gregory Dawe,...
ICTAI
2010
IEEE
13 years 5 months ago
The BioASP Library: ASP Solutions for Systems Biology
Abstract--Today's molecular biology is confronted with enormous amounts of data, generated by new high-throughput technologies, along with an increasing number of biological m...
Martin Gebser, Arne König, Torsten Schaub, Sv...
CPAIOR
2009
Springer
14 years 2 months ago
Optimal Interdiction of Unreactive Markovian Evaders
The interdiction problem arises in a variety of areas including military logistics, infectious disease control, and counter-terrorism. In the typical formulation of network interdi...
Alexander Gutfraind, Aric A. Hagberg, Feng Pan