Sciweavers

4217 search results - page 59 / 844
» Computational indistinguishability logic
Sort
View
CHI
2001
ACM
15 years 10 months ago
Using thumbnails to search the Web
We introduce a technique for creating novel, textuallyenhanced thumbnails of Web pages. These thumbnails combine the advantages of image thumbnails and text summaries to provide c...
Allison Woodruff, Andrew Faulring, Ruth Rosenholtz...
ACSC
2009
IEEE
15 years 4 months ago
Microdata Protection Through Approximate Microaggregation
Microdata protection is a hot topic in the field of Statistical Disclosure Control, which has gained special interest after the disclosure of 658000 queries by the America Online...
Xiaoxun Sun, Hua Wang, Jiuyong Li
IPPS
2007
IEEE
15 years 4 months ago
Almost Peer-to-Peer Clock Synchronization
In this paper, an almost peer-to-peer (AP2P) clock synchronization protocol is proposed. AP2P is almost peer-topeer in the sense that it provides the desirable features of a purel...
Ahmed Sobeih, Michel Hack, Zhen Liu, Li Zhang
ICALP
2005
Springer
15 years 3 months ago
On Steganographic Chosen Covertext Security
At TCC 2005, Backes and Cachin proposed a new and very strong notion of security for public key steganography: secrecy against adaptive chosen covertext attack (SS-CCA); and posed ...
Nicholas Hopper
CGI
1999
IEEE
15 years 2 months ago
Volume Decimation of Irregular Tetrahedral Grids
Rendering highly complex models can be time and space prohibitive, and decimation is an important tool in providing simplifications. A decimated model may replace the original ent...
Allen Van Gelder, Vivek Verma, Jane Wilhelms