Sciweavers

4137 search results - page 742 / 828
» On the number of matchings of a tree
Sort
View
ASIAN
2007
Springer
102views Algorithms» more  ASIAN 2007»
14 years 2 months ago
A Static Birthmark of Binary Executables Based on API Call Structure
Abstract. A software birthmark is a unique characteristic of a program that can be used as a software theft detection. In this paper we suggest and empirically evaluate a static bi...
Seokwoo Choi, Heewan Park, Hyun-il Lim, Taisook Ha...
FC
2007
Springer
122views Cryptology» more  FC 2007»
14 years 2 months ago
Mental Models of Security Risks
1 2 There is a critical need in computer security to communicate risks and thereby enable informed decisions by naive users. Yet computer security has not been engaged with the sc...
Farzaneh Asgharpour, Debin Liu, L. Jean Camp
PSIVT
2007
Springer
239views Multimedia» more  PSIVT 2007»
14 years 1 months ago
People Counting in Low Density Video Sequences
This paper presents a novel approach for automatic people counting in videos captured through a conventional closed-circuit television (CCTV) using computer vision techniques. The ...
Jaime Dalla Valle, Luiz E. Soares de Oliveira, Ale...
SSS
2007
Springer
121views Control Systems» more  SSS 2007»
14 years 1 months ago
Byzantine Self-stabilizing Pulse in a Bounded-Delay Model
Abstract. “Pulse Synchronization” intends to invoke a recurring distributed event at the different nodes, of a distributed system as simultaneously as possible and with a freq...
Danny Dolev, Ezra N. Hoch
FOCS
2006
IEEE
14 years 1 months ago
Explicit Exclusive Set Systems with Applications to Broadcast Encryption
A family of subsets C of [n] def = {1, . . . , n} is (r, t)exclusive if for every S ⊂ [n] of size at least n − r, there exist S1, . . . , St ∈ C with S = S1∪S2∪· · · ...
Craig Gentry, Zulfikar Ramzan, David P. Woodruff