Sciweavers

121 search results - page 5 / 25
» Data Assurance in Opaque Computations
Sort
View
WSC
1997
14 years 10 months ago
Data Analysis and Automatic Run-Length Control in CSIM18
The data collection and the automatic run-length control features provided in the CSIM18 library allow model builders to easily collect valid data from a simulation model and to b...
Herbert D. Schwetman, Jeffrey A. Brumfield
CORR
2007
Springer
75views Education» more  CORR 2007»
14 years 9 months ago
On Ullman's theorem in computer vision
Both in the plane and in space, we invert the nonlinear Ullman transformation for 3 points and 3 orthographic cameras. While Ullman’s theorem assures a unique reconstruction mod...
Oliver Knill, Jose Ramirez-Herran
ICPADS
2005
IEEE
15 years 3 months ago
An Adaptive Multiparty Protocol for Secure Data Protection
To better protect information systems, computation time data protection needs to be considered such that even when the system is partially compromised, the security of the system ...
Qingkai Ma, Liangliang Xiao, I-Ling Yen, Manghui T...
PAM
2012
Springer
13 years 5 months ago
A Sequence-Oriented Stream Warehouse Paradigm for Network Monitoring Applications
Network administrators are faced with the increasingly challenging task of monitoring their network’s health in real time, drawing upon diverse and voluminous measurement data fe...
Lukasz Golab, Theodore Johnson, Subhabrata Sen, Je...
107
Voted
HASE
2008
IEEE
15 years 4 months ago
Low Cost Secure Computation for the General Client-Server Computation Model
Due to the large number of attacks on open networks, information theft becomes a more and more severe problem. Secure computation can offer highly assured confidentiality protecti...
Liangliang Xiao, I-Ling Yen, Farokh B. Bastani