Sciweavers

319 search results - page 26 / 64
» Cryptographic Assumptions: A Position Paper
Sort
View
128
Voted
JCP
2008
216views more  JCP 2008»
15 years 20 days ago
Direct Anonymous Attestation for Next Generation TPM
Trusted computing platforms have been proposed as a promising approach to enhance the security of general-purpose computing systems. Direct Anonymous Attestation(DAA) is a scheme t...
Xiaofeng Chen 0004, Dengguo Feng
119
Voted
INFOCOM
2012
IEEE
13 years 3 months ago
Experimental performance comparison of Byzantine Fault-Tolerant protocols for data centers
Abstract—In this paper, we implement and evaluate three different Byzantine Fault-Tolerant (BFT) state machine replication protocols for data centers: (1) BASIC: The classic solu...
Guanfeng Liang, Benjamin Sommer, Nitin H. Vaidya
ISCC
2006
IEEE
15 years 6 months ago
Security for the Mythical Air-Dropped Sensor Network
The research area of very large scale wireless sensor networks made of low-cost sensors is gaining a lot of interest as witnessed by the large number of published papers. The secu...
Chandana Gamage, Kemal Bicakci, Bruno Crispo, Andr...
90
Voted
IJCAI
1993
15 years 2 months ago
A Tractable Class of Abduction Problems
literal: Let p be a proposition. Then p and -p are literals. clause: A clause is a disjunction of literals. Horn Clause: A Horn Clause is a clause in which there is at most one po...
Kave Eshghi
SMI
2006
IEEE
144views Image Analysis» more  SMI 2006»
15 years 6 months ago
Robust Alignment of Multi-view Range Data to CAD Model
Surface matching is a common task in computer graphics and computer vision. In this paper, we introduce a novel algorithm that aligns scanned point-based surfaces to the related 3...
Xinju Li, Igor Guskov, Jacob Barhak