Sciweavers

1414 search results - page 217 / 283
» Randomness and Universal Machines
Sort
View
TOCS
2002
70views more  TOCS 2002»
13 years 9 months ago
Secure program partitioning
This paper presents secure program partitioning, a language-based technique for protecting confidential data during computation in distributed systems containing mutually untruste...
Steve Zdancewic, Lantian Zheng, Nathaniel Nystrom,...
TON
2002
99views more  TON 2002»
13 years 9 months ago
Beyond folklore: observations on fragmented traffic
Fragmented IP traffic is a poorly understood component of the overall mix of traffic on the Internet. Many assertions about the nature and extent of fragmented traffic are anecdota...
Colleen Shannon, David Moore, Kimberly C. Claffy
JFP
2010
82views more  JFP 2010»
13 years 8 months ago
Formal polytypic programs and proofs
The aim of our work is to be able to do fully formal, machine verified proofs over Generic Haskellstyle polytypic programs. In order to achieve this goal, we embed polytypic prog...
Wendy Verbruggen, Edsko de Vries, Arthur Hughes
SCN
2010
Springer
142views Communications» more  SCN 2010»
13 years 8 months ago
How to Pair with a Human
We introduce a protocol, that we call Human Key Agreement, that allows pairs of humans to establish a key in a (seemingly hopeless) case where no public-key infrastructure is avail...
Stefan Dziembowski
ICPR
2010
IEEE
13 years 8 months ago
Low-Level Image Segmentation Based Scene Classification
This paper is aimed at evaluating the semantic information content of multiscale, low-level image segmentation. As a method of doing this, we use selected features of segmentation...
Emre Akbas, Narendra Ahuja