Sciweavers

977 search results - page 139 / 196
» Secure Computation with Fixed-Point Numbers
Sort
View
PERCOM
2004
ACM
14 years 8 months ago
On Negotiating Automatic Device Configuration in Smart Environments
As the number of mobile devices we carry grows, the job of managing those devices throughout the day becomes cumbersome. In addition, the ability to use mobile devices in unethica...
Kay Connelly, Ashraf Khalil
ICASSP
2009
IEEE
14 years 4 months ago
Wildfire detection using LMS based active learning
A computer vision based algorithm for wildfire detection is developed. The main detection algorithm is composed of four sub-algorithms detecting (i) slow moving objects, (ii) gra...
B. Ugur Töreyin, A. Enis Çetin
P2P
2007
IEEE
14 years 3 months ago
The Effect of Viral Media on Business Usage of P2P
P2P file-sharing poses a number of serious problems for business network administrators including: unpredictable network usage, increased vulnerability to security threats and the...
Danny Hughes, James Walkerdine, Kevin Lee
ICALP
2005
Springer
14 years 2 months ago
Combining Intruder Theories
Abstract. Most of the decision procedures for symbolic analysis of protocols are limited to a fixed set of algebraic operators associated with a fixed intruder theory. Examples o...
Yannick Chevalier, Michaël Rusinowitch
NOSSDAV
2005
Springer
14 years 2 months ago
Mitigating information exposure to cheaters in real-time strategy games
Cheating in on-line games is a prevalent problem for both game makers and players. The popular real-time strategy game genre is especially vulnerable to cheats, as it is frequentl...
Chris Chambers, Wu-chang Feng, Wu-chi Feng, Debanj...