Sciweavers

473 search results - page 35 / 95
» Computing excluded minors
Sort
View
IEEEARES
2008
IEEE
15 years 4 months ago
Towards Secure E-Commerce Based on Virtualization and Attestation Techniques
We present a secure e-commerce architecture that is resistant to client compromise and man-in-the-middle attacks on SSL. To this end, we propose several security protocols that us...
Frederic Stumpf, Claudia Eckert, Shane Balfe
IMA
2005
Springer
127views Cryptology» more  IMA 2005»
15 years 3 months ago
On the Automatic Construction of Indistinguishable Operations
Abstract. An increasingly important design constraint for software running on ubiquitous computing devices is security, particularly against physical methods such as side-channel a...
Manuel Barbosa, Dan Page
ICPR
2010
IEEE
14 years 10 months ago
Approximate Belief Propagation by Hierarchical Averaging of Outgoing Messages
Abstract—This paper presents an approximate belief propagation algorithm that replaces outgoing messages from a node with the averaged outgoing message and propagates messages fr...
Koichi Ogawara
79
Voted
ECCV
1992
Springer
16 years 4 days ago
Texture Segmentation by Minimizing Vector-Valued Energy Functionals: The Coupled-Membrane Model
This paper presents a computational model that segments images based on the textural properties of object surfaces. The proposed Coupled-Membrane model applies the weak membrane ap...
Tai Sing Lee, David Mumford, Alan L. Yuille
ICPR
2008
IEEE
15 years 4 months ago
Interactive labeling of facial action units
For many computer vision problems, it is very important to produce the groundtruth data. Manual data labeling is labor-intensive and prone to the human errors, whereas fully autom...
Lei Zhang, Yan Tong, Qiang Ji