Sciweavers

2624 search results - page 19 / 525
» The 2LIP model and its implementations
Sort
View
ASPDAC
2004
ACM
103views Hardware» more  ASPDAC 2004»
13 years 11 months ago
Design and implementation of a secret key steganographic micro-architecture employing FPGA
In the well-known "prisoners' problem", a representative example of steganography, two persons attempt to communicate covertly without alerting the warden. One appr...
Hala A. Farouk, Magdy Saeb
WSC
2001
13 years 9 months ago
Simulation data exchange (SDX) implementation and use
Facility layouts of existing or proposed production systems often form the basis of a dynamic simulation study to prove the design concept and to determine if the required through...
David P. Sly, Shreekanth Moorthy
ESORICS
2006
Springer
13 years 11 months ago
TrustedPals: Secure Multiparty Computation Implemented with Smart Cards
We study the problem of Secure Multi-party Computation (SMC) in a model where individual processes contain a tamper-proof security module, and introduce the TrustedPals framework, ...
Milan Fort, Felix C. Freiling, Lucia Draque Penso,...
ICAT
2003
IEEE
14 years 27 days ago
Agent-based Model for Intelligent Shopping Assistant and its Application
With the rapid expansion of the Internet, the implementation of agent technology in electronic commerce (e-commerce) becomes very popular, which provides a promising field for the...
Xu-Bing Pan, Zhi Geng, Yang-Hong Wei
DELOS
2007
13 years 9 months ago
MESSIF: Metric Similarity Search Implementation Framework
The similarity search has become a fundamental computational task in many applications. One of the mathematical models of the similarity – the metric space – has drawn attenti...
Michal Batko, David Novak, Pavel Zezula