Sciweavers

759 search results - page 56 / 152
» What Can Be Implemented Anonymously
Sort
View
CCS
2010
ACM
13 years 10 months ago
Security analysis of India's electronic voting machines
Elections in India are conducted almost exclusively using electronic voting machines developed over the past two decades by a pair of government-owned companies. These devices, kn...
Scott Wolchok, Eric Wustrow, J. Alex Halderman, Ha...
CSE
2010
IEEE
13 years 10 months ago
MCALab: Reproducible Research in Signal and Image Decomposition and Inpainting
Morphological Component Analysis (MCA) of signals and images is an ambitious and important goal in signal processing; successful methods for MCA have many far-reaching application...
Mohamed-Jalal Fadili, Jean-Luc Starck, Michael Ela...
CORR
2002
Springer
141views Education» more  CORR 2002»
13 years 9 months ago
Question answering: from partitions to Prolog
Abstract. We implement Groenendijk and Stokhof's partition semantics of questions in a simple question answering algorithm. The algorithm is sound, complete, and based on tabl...
Balder ten Cate, Chung-chieh Shan
SIAMCOMP
2002
98views more  SIAMCOMP 2002»
13 years 9 months ago
Self-Stabilizing Symmetry Breaking in Constant Space
abstract Alain Mayer Yoram Ofeky Rafail Ostrovskyz Moti Yungx We investigate the problem of self-stabilizing round-robin token management scheme on an anonymous bidirectional ring...
Alain J. Mayer, Rafail Ostrovsky, Yoram Ofek, Moti...
CCS
2011
ACM
12 years 10 months ago
Privacy and accountability for location-based aggregate statistics
A significant and growing class of location-based mobile applications aggregate position data from individual devices at a server and compute aggregate statistics over these posi...
Raluca A. Popa, Andrew J. Blumberg, Hari Balakrish...