Sciweavers

1497 search results - page 140 / 300
» A Computational Model for Message Passing
Sort
View
141
Voted
RT
2000
Springer
15 years 7 months ago
Interactive Tone Mapping
Tone mapping and visual adaptation are crucial for the generation of static, photorealistic images. A largely unexplored problem is the simulation of adaptation and its changes ove...
Frédo Durand, Julie Dorsey
148
Voted
BROADNETS
2006
IEEE
15 years 9 months ago
Optimizing IP Multicast through Delayed Multicast Tree Pruning
This paper studies the system parameters that affect the total cost of managing the multicast group on a router. A Petri net model is first proposed to describe the states and tra...
Yongjun Li, Wenhui Zhou, James Zijun Wang, Deyu Qi
113
Voted
ESORICS
2006
Springer
15 years 7 months ago
TrustedPals: Secure Multiparty Computation Implemented with Smart Cards
We study the problem of Secure Multi-party Computation (SMC) in a model where individual processes contain a tamper-proof security module, and introduce the TrustedPals framework, ...
Milan Fort, Felix C. Freiling, Lucia Draque Penso,...
127
Voted
TIT
2008
84views more  TIT 2008»
15 years 3 months ago
Information Theoretic Bounds on Authentication Systems in Query Model
Authentication codes provide message integrity guarantees in an information theoretic sense within a symmetric key setting. Information theoretic bounds on the success probability...
Reihaneh Safavi-Naini, Peter R. Wild
105
Voted
CCS
1994
ACM
15 years 7 months ago
Support for the File System Security Requirements of Computational E-Mail Systems
Computational e-mail systems, which allow mail messages to containcommandscripts that automaticallyexecute upon receipt, can be used as a basis for building a variety of collabora...
Trent Jaeger, Atul Prakash