Sciweavers

3972 search results - page 311 / 795
» Cosparse analysis modeling - uniqueness and algorithms
Sort
View
EUROCRYPT
2010
Springer
15 years 9 months ago
Plaintext-Dependent Decryption: A Formal Security Treatment of SSH-CTR
This paper presents a formal security analysis of SSH in counter mode in a security model that accurately captures the capabilities of real-world attackers, as well as security-rel...
Kenneth G. Paterson, Gaven J. Watson
SAC
2009
ACM
15 years 9 months ago
Latency-aware leader election
Experimental studies have shown that electing a leader based on measurements of the underlying communication network can be beneficial. We use this approach to study the problem ...
Nuno Santos, Martin Hutle, André Schiper
PPDP
2001
Springer
15 years 9 months ago
Trust in the Pi-Calculus
We introduce a new system of trust analysis for concurrent and distributed systems using the π-calculus[13, 14, 15] as a modelling tool. A Type system using boolean annotations g...
Mark Hepburn, David Wright
ICDAR
2009
IEEE
15 years 2 months ago
Clutter Noise Removal in Binary Document Images
The paper presents a clutter detection and removal algorithm for complex document images. The distance transform based approach is independent of clutter's position, size, sh...
Mudit Agrawal, David S. Doermann
CDC
2010
IEEE
203views Control Systems» more  CDC 2010»
14 years 11 months ago
Cyber security analysis of state estimators in electric power systems
In this paper, we analyze the cyber security of state estimators in Supervisory Control and Data Acquisition (SCADA) systems operating in power grids. Safe and reliable operation o...
André Teixeira, Saurabh Amin, Henrik Sandbe...