Sciweavers

128 search results - page 7 / 26
» Weak Verifiable Random Functions
Sort
View
CCS
2006
ACM
14 years 9 days ago
Secure information flow with random assignment and encryption
Type systems for secure information flow aim to prevent a program from leaking information from variables classified as H to variables classified as L. In this work we extend such...
Geoffrey Smith
ENTCS
2002
88views more  ENTCS 2002»
13 years 8 months ago
Testing Concurrent Java Programs using Randomized Scheduling
The difficulty of finding errors caused by unexpected interleavings of threads in concurrent programs is well known. Model checkers can pinpoint such errors and verify correctness...
Scott D. Stoller
PKC
1999
Springer
83views Cryptology» more  PKC 1999»
14 years 25 days ago
On the Security of Random Sources
Abstract. Many applications rely on the security of their random number generator. It is therefore essential that such devices be extensively tested for malfunction. The purpose of...
Jean-Sébastien Coron
HICSS
2002
IEEE
100views Biometrics» more  HICSS 2002»
14 years 1 months ago
Calculation of the Probability Density Function of Critical Clearing Time in Transient Stability Analysis
In this paper, the critical clearing time, tcc in power system transient stability analysis is modeled as a random variable due to the randomness nature of power system load. A lin...
Yiqiao Liang, Saffet Ayasun, Chika Nwankpa
ICPR
2010
IEEE
14 years 2 months ago
On-Line Random Naive Bayes for Tracking
—Randomized learning methods (i.e., Forests or Ferns) have shown excellent capabilities for various computer vision applications. However, it was shown that the tree structure in...
Martin Godec, Christian Leistner, Amir Saffari, Ho...