Sciweavers

417 search results - page 65 / 84
» The Start of an Eiffel Standard
Sort
View
CRYPTO
2001
Springer
152views Cryptology» more  CRYPTO 2001»
14 years 1 days ago
Secure Distributed Linear Algebra in a Constant Number of Rounds
Consider a network of processors among which elements in a finite field K can be verifiably shared in a constant number of rounds. Assume furthermore constant-round protocols ar...
Ronald Cramer, Ivan Damgård
MMMACNS
2001
Springer
13 years 12 months ago
Future Directions in Role-Based Access Control Models
Abstract. In the past five years there has been tremendous activity in rolebased access control (RBAC) models. Consensus has been achieved on a standard core RBAC model that is in ...
Ravi S. Sandhu
AIPR
2000
IEEE
13 years 12 months ago
Moving Object Tracking in Video
The advance of technology makes video acquisition devices better and less costly, thereby increasing the number of applications that can effectively utilize digital video. Compare...
Yiwei Wang, John F. Doherty, Robert E. Van Dyck
FSE
1998
Springer
137views Cryptology» more  FSE 1998»
13 years 11 months ago
Differential Cryptanalysis of the ICE Encryption Algorithm
ICE is a 64-bit block cipher presented at the Fast Software Encryption Workshop in January 1997. It introduced the concept of a keyed permutation to improve the resistance against ...
Bart Van Rompay, Lars R. Knudsen, Vincent Rijmen
EMO
2006
Springer
124views Optimization» more  EMO 2006»
13 years 11 months ago
I-MODE: An Interactive Multi-objective Optimization and Decision-Making Using Evolutionary Methods
With the popularity of efficient multi-objective evolutionary optimization (EMO) techniques and the need for such problem-solving activities in practice, EMO methodologies and EMO ...
Kalyanmoy Deb, Shamik Chaudhuri