Sciweavers

29908 search results - page 5812 / 5982
» On the Complexity of
Sort
View
JMM2
2007
96views more  JMM2 2007»
13 years 8 months ago
Software Watermarking Resilient to Debugging Attacks
Abstract— In 2006, Gaurav Gupta and Josef Pieprzyk presented an attack on the branch-based software watermarking scheme proposed by Ginger Myles and Hongxia Jin in 2005. The softw...
Gaurav Gupta, Josef Pieprzyk
JMM2
2007
212views more  JMM2 2007»
13 years 8 months ago
Flux Tensor Constrained Geodesic Active Contours with Sensor Fusion for Persistent Object Tracking
— This paper makes new contributions in motion detection, object segmentation and trajectory estimation to create a successful object tracking system. A new efficient motion det...
Filiz Bunyak, Kannappan Palaniappan, Sumit Kumar N...
TSMC
2008
113views more  TSMC 2008»
13 years 8 months ago
Distributed Diagnosis Under Bounded-Delay Communication of Immediately Forwarded Local Observations
In this paper, we study distributed failure diagnosis under k-bounded communication delay, where each local site transmits its observations to other sites immediately after each o...
Wenbin Qiu, Ratnesh Kumar
JOC
2007
94views more  JOC 2007»
13 years 8 months ago
On Unconditionally Secure Distributed Oblivious Transfer
This paper is about the Oblivious Transfer in the distributed model proposed by M. Naor and B. Pinkas. In this setting a Sender has n secrets and a Receiver is interested in one o...
Carlo Blundo, Paolo D'Arco, Alfredo De Santis, Dou...
JOC
2007
93views more  JOC 2007»
13 years 8 months ago
Robust Information-Theoretic Private Information Retrieval
A Private Information Retrieval (PIR) protocol allows a user to retrieve a data item of its choice from a database, such that the servers storing the database do not gain informat...
Amos Beimel, Yoav Stahl
« Prev « First page 5812 / 5982 Last » Next »