Sciweavers

434 search results - page 79 / 87
» The Case for Browser Provenance
Sort
View
EUROCRYPT
2003
Springer
14 years 2 months ago
On the Limitations of Universally Composable Two-Party Computation without Set-up Assumptions
The recently proposed universally composable (UC) security framework for analyzing security of cryptographic protocols provides very strong security guarantees. In particular, a p...
Ran Canetti, Eyal Kushilevitz, Yehuda Lindell
INFOCOM
2000
IEEE
14 years 1 months ago
On Service Models for Multicast Transmission in Heterogeneous Environments
– We examine in this paper the tradeoff between application complexity, network complexity, and network efficiency. We argue that the design of the current Internet reflects a ...
Matthias Grossglauser, Jean-Chrysostome Bolot
IOLTS
2000
IEEE
105views Hardware» more  IOLTS 2000»
14 years 1 months ago
Comparison between Random and Pseudo-Random Generation for BIST of Delay, Stuck-at and Bridging Faults
The combination of higher quality requirements and sensitivity of high performance circuits to delay defects has led to an increasing emphasis on delay testing of VLSI circuits. A...
Patrick Girard, Christian Landrault, Serge Pravoss...
ECOOP
1999
Springer
14 years 1 months ago
Visualizing Reference Patterns for Solving Memory Leaks in Java
Many Java programmers believe they do not have to worry about memory management because of automatic garbage collection. In fact, many Java programs run out of memory unexpectedly ...
Wim De Pauw, Gary Sevitsky
SIGGRAPH
1996
ACM
14 years 28 days ago
Blue Screen Matting
A classical problem of imaging--the matting problem--is separation of a non-rectangular foreground image from a (usually) rectangular background image--for example, in a film fram...
Alvy Ray Smith, James F. Blinn