Sciweavers

8655 search results - page 260 / 1731
» Challenges for Trusted Computing
Sort
View
ISPAN
2005
IEEE
15 years 8 months ago
Distributed Algorithmic Mechanism Design for Scheduling on Unrelated Machines
In classical mechanism design setting the outcome of the mechanism is computed by a trusted central party. In this paper we consider distributed implementations in which the outco...
Thomas E. Carroll, Daniel Grosu
CVPR
2004
IEEE
16 years 5 months ago
Distortion Estimation Techniques in Solving Visual CAPTCHAs
Abstract-- This paper describes two distortion estimation techniques for object recognition that solve EZ-Gimpy and Gimpy-r, two of the visual CAPTCHAs ("Completely Automated ...
Gabriel Moy, Nathan Jones, Curt Harkless, Randall ...
DIS
2007
Springer
15 years 9 months ago
Machine Learning in Ecosystem Informatics
Ecosystem Informatics brings together mathematical and computational tools to address scientific and policy challenges in the ecosystem sciences. These challenges include novel s...
Thomas G. Dietterich
ESORICS
2009
Springer
16 years 3 months ago
WORM-SEAL: Trustworthy Data Retention and Verification for Regulatory Compliance
Abstract. As the number and scope of government regulations and rules mandating trustworthy retention of data keep growing, businesses today are facing a higher degree of regulatio...
Tiancheng Li, Xiaonan Ma, Ninghui Li
CHES
2009
Springer
140views Cryptology» more  CHES 2009»
16 years 3 months ago
On Tamper-Resistance from a Theoretical Viewpoint
Tamper-proof devices are pretty powerful. They can be used to have better security in applications. In this work we observe that they can also be maliciously used in order to defea...
Paulo Mateus, Serge Vaudenay