Sciweavers

639 search results - page 77 / 128
» About Norms and Causes
Sort
View
CCS
2007
ACM
15 years 6 months ago
Split-ballot voting: everlasting privacy with distributed trust
In this paper we propose a new voting protocol with desirable security properties. The voting stage of the protocol can be performed by humans without computers; it provides every...
Tal Moran, Moni Naor
GPCE
2007
Springer
15 years 6 months ago
Aspects of availability
In this paper, we propose a domain-specific aspect language to prevent the denials of service caused by resource management. Our aspects specify availability policies by enforcin...
Pascal Fradet, Stéphane Hong Tuan Ha
SCIA
2007
Springer
153views Image Analysis» more  SCIA 2007»
15 years 6 months ago
Graph Cut Based Segmentation of Soft Shadows for Seamless Removal and Augmentation
Abstract. This paper introduces a new concept within shadow segmentation for usage in shadow removal and augmentation through construction of a multiplicity alpha overlay shadow mo...
Michael Nielsen, Claus B. Madsen
BIBE
2006
IEEE
123views Bioinformatics» more  BIBE 2006»
15 years 6 months ago
Isolation and Visualization of Codon Usage Biases
While genomic sequencing projects have proved an abundant source of information for biological studies ranging from the molecular to the ecological in scale, much of the informati...
Douglas W. Raiford, Dan E. Krane, Travis E. Doom, ...
DATE
2006
IEEE
153views Hardware» more  DATE 2006»
15 years 6 months ago
Analyzing timing uncertainty in mesh-based clock architectures
Mesh architectures are used to distribute critical global signals on a chip, such as clock and power/ground. Redundancy created by mesh loops smooths out undesirable variations be...
Subodh M. Reddy, Gustavo R. Wilke, Rajeev Murgai