Sciweavers

392 search results - page 29 / 79
» Privacy Requirement Modeling and Verification in Cloud Compu...
Sort
View
OOPSLA
2010
Springer
13 years 9 months ago
Language virtualization for heterogeneous parallel computing
As heterogeneous parallel systems become dominant, application developers are being forced to turn to an incompatible mix of low level programming models (e.g. OpenMP, MPI, CUDA, ...
Hassan Chafi, Zach DeVito, Adriaan Moors, Tiark Ro...
CISC
2008
Springer
148views Cryptology» more  CISC 2008»
14 years 19 days ago
Publicly Verifiable Privacy-Preserving Group Decryption
Anonymity is one of the main concerns in group-oriented cryptography. However, most efforts, for instance, group signatures and ring signatures, are only made to provide anonymity ...
Bo Qin, Qianhong Wu, Willy Susilo, Yi Mu
ICPR
2006
IEEE
14 years 11 months ago
Efficient Search and Verification for Function Based Classification from Real Range Images
In this work we propose a probabilistic model for generic object classification from raw range images. Our approach supports a validation process in which classes are verified usi...
Ehud Rivlin, Ilan Shimshoni, Octavian Soldea
VLSID
2006
IEEE
183views VLSI» more  VLSID 2006»
14 years 4 months ago
Design Challenges for High Performance Nano-Technology
This tutorial present the key aspects of design challenges and its solutions that are being experienced in VLSI design in the era of nano technology. The focus will be on design c...
Goutam Debnath, Paul J. Thadikaran
CORR
2008
Springer
166views Education» more  CORR 2008»
13 years 10 months ago
Information-Theoretically Secure Voting Without an Honest Majority
We present three voting protocols with unconditional privacy and information-theoretic correctness, without assuming any bound on the number of corrupt voters or voting authorities...
Anne Broadbent, Alain Tapp