Sciweavers

8655 search results - page 1365 / 1731
» Challenges for Trusted Computing
Sort
View
USS
2008
15 years 6 months ago
VoteBox: A Tamper-evident, Verifiable Electronic Voting System
Commercial electronic voting systems have experienced many high-profile software, hardware, and usability failures in real elections. While it is tempting to abandon electronic vo...
Daniel Sandler, Kyle Derr, Dan S. Wallach
ASSETS
2008
ACM
15 years 5 months ago
Technology for just-in-time in-situ learning of facial affect for persons diagnosed with an autism spectrum disorder
Many first-hand accounts from individuals diagnosed with autism spectrum disorders (ASD) highlight the challenges inherent in processing high-speed, complex, and unpredictable soc...
Miriam Madsen, Rana El Kaliouby, Matthew Goodwin, ...
BMEI
2008
IEEE
15 years 5 months ago
Clustering of High-Dimensional Gene Expression Data with Feature Filtering Methods and Diffusion Maps
The importance of gene expression data in cancer diagnosis and treatment by now has been widely recognized by cancer researchers in recent years. However, one of the major challen...
Rui Xu, Steven Damelin, Boaz Nadler, Donald C. Wun...
ICSAP
2010
15 years 5 months ago
Tamper Proofing 3D Models
- This paper describes a novel algorithm designed for tamper proofing of 3D models. Fragile watermarking is a known technique for detecting location of tamper in the artwork. Howev...
Mukesh C. Motwani, Balaji Sridharan, Rakhi C. Motw...
CCS
2008
ACM
15 years 5 months ago
Asynchronous policy evaluation and enforcement
Evaluating and enforcing policies in large-scale networks is one of the most challenging and significant problems facing the network security community today. Current solutions ar...
Matthew Burnside, Angelos D. Keromytis
« Prev « First page 1365 / 1731 Last » Next »