Sciweavers

2259 search results - page 12 / 452
» Separation and information hiding
Sort
View
LICS
2008
IEEE
14 years 1 months ago
Hiding Local State in Direct Style: A Higher-Order Anti-Frame Rule
Separation logic involves two dual forms of modularity: local reasoning makes part of the store invisible within a static scope, whereas hiding local state makes part of the store...
François Pottier
IROS
2009
IEEE
159views Robotics» more  IROS 2009»
14 years 2 months ago
Hiding real-time: A new approach for the software development of industrial robots
—Software development for industrial robots is still strongly limited by the use of old-style robot programming languages. These languages are tailored to meet a special requirem...
Alwin Hoffmann, Andreas Angerer, Frank Ortmeier, M...
IWDW
2007
Springer
14 years 1 months ago
Multiple Domain Watermarking for Print-Scan and JPEG Resilient Data Hiding
In this paper, we propose a print-scan resilient watermarking method which takes advantage of multiple watermarking. The method presented here consists of three separate watermarks...
Anu Pramila, Anja Keskinarkaus, Tapio Seppäne...
SAC
2006
ACM
14 years 1 months ago
On the use of spectral filtering for privacy preserving data mining
Randomization has been a primary tool to hide sensitive private information during privacy preserving data mining.The previous work based on spectral filtering, show the noise ma...
Songtao Guo, Xintao Wu
CRYPTO
2000
Springer
157views Cryptology» more  CRYPTO 2000»
13 years 12 months ago
Reducing the Servers Computation in Private Information Retrieval: PIR with Preprocessing
Private information retrieval (PIR) enables a user to retrieve a data item from a database, replicated among one or more servers, while hiding the identity of the retrieved item. ...
Amos Beimel, Yuval Ishai, Tal Malkin