Sciweavers

94 search results - page 6 / 19
» Towards Robust Computation on Encrypted Data
Sort
View
ICPR
2006
IEEE
14 years 8 months ago
Classification of Team Behaviors in Sports Video Games
This paper considers the application of pattern recognition techniques in modern computer games. Towards the problem of realizing more life-like behavior for artificial game chara...
Christian Thurau, Thomas Hettenhausen, Christian B...
COMSWARE
2007
IEEE
14 years 1 months ago
Scalable Multicast Platforms for a New Generation of Robust Distributed Applications
1 As distributed systems scale up and are deployed into increasingly sensitive settings, demand is rising for a new generation of communications middleware in support of applicati...
Ken Birman, Mahesh Balakrishnan, Danny Dolev, Tudo...
CCS
2007
ACM
13 years 11 months ago
Reconfigurable trusted computing in hardware
Trusted Computing (TC) is an emerging technology towards building trustworthy computing platforms. The Trusted Computing Group (TCG) has proposed several specifications to impleme...
Thomas Eisenbarth, Tim Güneysu, Christof Paar...
MICCAI
2000
Springer
13 years 11 months ago
Robust 3D Segmentation of Anatomical Structures with Level Sets
This paper is focused on the use of the level set formalism to segment anatomical structures in 3D images (ultrasound ou magnetic resonance images). A closed 3D surface propagates...
C. Baillard, Christian Barillot
SIGCOMM
2010
ACM
13 years 7 months ago
Fived: a service-based architecture implementation to innovate at the endpoints
Security functions such as access control, encryption and authentication are typically left up to applications on the modern Internet. There is no unified system to implement thes...
D. J. Capelis, Darrell D. E. Long