Sciweavers

135 search results - page 26 / 27
» Privacy Preserving Communication in MANETs
Sort
View
CTRSA
2009
Springer
179views Cryptology» more  CTRSA 2009»
14 years 1 months ago
Adaptively Secure Two-Party Computation with Erasures
In the setting of multiparty computation a set of parties with private inputs wish to compute some joint function of their inputs, whilst preserving certain security properties (l...
Andrew Y. Lindell
ACSAC
2009
IEEE
14 years 1 months ago
Protecting Commodity Operating System Kernels from Vulnerable Device Drivers
Device drivers on commodity operating systems execute with kernel privilege and have unfettered access to kernel data structures. Several recent attacks demonstrate that such poor...
Shakeel Butt, Vinod Ganapathy, Michael M. Swift, C...
OOPSLA
2009
Springer
14 years 1 months ago
Optimizing programs with intended semantics
Modern object-oriented languages have complex features that cause programmers to overspecify their programs. This overspeciļ¬cation hinders automatic optimizers, since they must ...
Daniel von Dincklage, Amer Diwan
EUPROJECTS
2006
Springer
13 years 10 months ago
Web Mediators for Accessible Browsing
We present a highly accurate method for classifying web pages based on link percentage, which is the percentage of text characters that are parts of links normalized by the number...
Benjamin N. Waber, John J. Magee, Margrit Betke
MDM
2010
Springer
281views Communications» more  MDM 2010»
13 years 8 months ago
Efficient Evaluation of k-Range Nearest Neighbor Queries in Road Networks
A k-Range Nearest Neighbor (or kRNN for short) query in road networks finds the k nearest neighbors of every point on the road segments within a given query region based on the net...
Jie Bao 0003, Chi-Yin Chow, Mohamed F. Mokbel, Wei...