Sciweavers

1045 search results - page 73 / 209
» The Use of Exceptions
Sort
View
ICCV
2001
IEEE
14 years 10 months ago
Multiple Motion Scene Reconstruction from Uncalibrated Views
We describe a reconstruction method of multiple motion scenes, which are the scenes containing multiple moving objects, from uncalibrated views. Assuming that the objects are movi...
Mei Han, Takeo Kanade
SOSP
2005
ACM
14 years 5 months ago
Labels and event processes in the Asbestos operating system
ormation flow. A new event process abstraction defines lightweight, isolated contexts within a single process, allowing one process to act on behalf of multiple users while preve...
Petros Efstathopoulos, Maxwell N. Krohn, Steve Van...
CSFW
2009
IEEE
14 years 3 months ago
Universally Composable Symmetric Encryption
For most basic cryptographic tasks, such as public key encryption, digital signatures, authentication, key exchange, and many other more sophisticated tasks, ideal functionalities...
Ralf Küsters, Max Tuengerthal
NDSS
2009
IEEE
14 years 3 months ago
The Blind Stone Tablet: Outsourcing Durability to Untrusted Parties
We introduce a new paradigm for outsourcing the durability property of a multi-client transactional database to an untrusted service provider. Specifically, we enable untrusted s...
Peter Williams, Radu Sion, Dennis Shasha
IEEEIAS
2009
IEEE
14 years 3 months ago
Guess and Determine Attack on SOSEMANUK
SOSEMANUK is a word-oriented stream cipher submitted to the ECRYPT stream cipher project, with a variable-length key between 128 and 256 bits. The algorithm is similar to the strea...
Ding Lin, Guan Jie