Sciweavers

138 search results - page 1 / 28
» 06371 Abstracts Collection -- From Security to Dependability
Sort
View
56
Voted
DAGSTUHL
2006
15 years 1 months ago
06371 Abstracts Collection -- From Security to Dependability
Christian Cachin, Felix C. Freiling, Jaap-Henk Hoe...
112
Voted
CRYPTO
2011
Springer
245views Cryptology» more  CRYPTO 2011»
14 years 11 days ago
Fully Homomorphic Encryption from Ring-LWE and Security for Key Dependent Messages
We present a somewhat homomorphic encryption scheme that is both very simple to describe and analyze, and whose security (quantumly) reduces to the worst-case hardness of problems ...
Zvika Brakerski, Vinod Vaikuntanathan
89
Voted
ICPR
2004
IEEE
16 years 1 months ago
A Two-Stage Approach for Segmentation and Recognition of Handwritten Digit Strings Collected from Mail Pieces
In this paper, we present an approach to interpret handwritten digit strings by employing a two-stage segmentation and recognition scheme. The first stage processing is to deal wi...
Gyeonghwan Kim, Seon-Hwa Jeong, Sungwon Park, Yunh...
100
Voted
SECURWARE
2008
IEEE
15 years 7 months ago
From Monitoring Templates to Security Monitoring and Threat Detection
Abstract. This paper presents our pattern-based approach to run-time requirements monitoring and threat detection being developed as part of an approach to build frameworks support...
Nuno Amálio, George Spanoudakis
102
Voted
TIP
2011
195views more  TIP 2011»
14 years 7 months ago
Accelerating X-Ray Data Collection Using Pyramid Beam Ray Casting Geometries
Abstract—Image reconstruction from its projections is a necessity in many applications such as medical (CT), security, inspection, and others. This paper extends the 2-D Fan-beam...
Amir Averbuch, Guy Lifschitz, Yoel Shkolnisky