Sciweavers

530 search results - page 95 / 106
» Practical Threshold Signatures
Sort
View
ICETE
2004
204views Business» more  ICETE 2004»
13 years 9 months ago
A Real-Time Intrusion Prevention System for Commercial Enterprise Databases
: - Modern intrusion detection systems are comprised of three basically different approaches, host based, network based, and a third relatively recent addition called procedural ba...
Ulf T. Mattsson
EUROCRYPT
2007
Springer
14 years 2 months ago
Atomic Secure Multi-party Multiplication with Low Communication
We consider the standard secure multi-party multiplication protocol due to M. Rabin. This protocol is based on Shamir’s secret sharing scheme and it can be viewed as a practical ...
Ronald Cramer, Ivan Damgård, Robbert de Haan
DCOSS
2006
Springer
13 years 11 months ago
GIST: Group-Independent Spanning Tree for Data Aggregation in Dense Sensor Networks
Abstract. Today, there exist many algorithms and protocols for constructing agregation or dissemination trees for wireless sensor networks that are optimal (for different notions o...
Lujun Jia, Guevara Noubir, Rajmohan Rajaraman, Rav...
COGSCI
2004
142views more  COGSCI 2004»
13 years 7 months ago
Characterizing perceptual learning with external noise
Performance in perceptual tasks often improves with practice. This effect is known as `perceptual learning,' and it has been the source of a great deal of interest and debate...
Jason M. Gold, Allison B. Sekuler, Partrick J. Ben...
SIGPRO
2002
92views more  SIGPRO 2002»
13 years 7 months ago
A unified method for optimizing linear image restoration filters
Image restoration from degraded images lies at the foundation of image processing, pattern recognition, and computer vision, so it has been extensively studied. A large number of ...
Masashi Sugiyama, Hidemitsu Ogawa