Sciweavers

1369 search results - page 236 / 274
» A Practical Implementation of the Timing Attack
Sort
View
94
Voted
TIP
2010
277views more  TIP 2010»
14 years 5 months ago
Distance Regularized Level Set Evolution and Its Application to Image Segmentation
Level set methods have been widely used in image processing and computer vision. In conventional level set formulations, the level set function typically develops irregularities du...
Chunming Li, Chenyang Xu, Changfeng Gui, Martin D....
CIDR
2007
116views Algorithms» more  CIDR 2007»
15 years 10 days ago
Life beyond Distributed Transactions: an Apostate's Opinion
Many decades of work have been invested in the area of distributed transactions including protocols such as 2PC, Paxos, and various approaches to quorum. These protocols provide t...
Pat Helland
92
Voted
ICC
2007
IEEE
186views Communications» more  ICC 2007»
15 years 5 months ago
An Efficient Cluster-Based Proactive Secret Share Update Scheme for Mobile Ad Hoc Networks
– When implementing public key security ser- easy for an adversary to collect data and attack. To solve this vices in mobile ad hoc networks (MANETs), multiple problem, the distr...
Ying Dong, Ai Fen Sui, Siu-Ming Yiu, Victor O. K. ...
118
Voted
CPAIOR
2007
Springer
15 years 5 months ago
Cost-Bounded Binary Decision Diagrams for 0-1 Programming
Abstract. In recent work binary decision diagrams (BDDs) were introduced as a technique for postoptimality analysis for integer programming. In this paper we show that much smaller...
Tarik Hadzic, John N. Hooker
89
Voted
SIGMOD
1999
ACM
99views Database» more  SIGMOD 1999»
15 years 3 months ago
Belief Reasoning in MLS Deductive Databases
It is envisaged that the application of the multilevel security (MLS) scheme will enhance exibility and e ectiveness of authorization policies in shared enterprise databases and w...
Hasan M. Jamil