Sciweavers

4702 search results - page 71 / 941
» How to Copyright a Function
Sort
View
CSUR
1999
137views more  CSUR 1999»
15 years 8 days ago
Algebraic Methods for Specification and Formal Development of Programs
with functions over those sets. This level of abstraction is commensurate with the view that the correctness of the input/output behaviour of a program takes precedence over all it...
Donald Sannella, Andrzej Tarlecki
79
Voted
NOMS
2002
IEEE
104views Communications» more  NOMS 2002»
15 years 5 months ago
Remote MIB-item look-up service
: Despite some deficiencies, the Internet management framework is widely deployed and thousands of Management Information Base (MIB) modules have been defined thus far. These modul...
Aiko Pras, Szabolcs Boros, Bert Helthuis
79
Voted
ACSAC
2001
IEEE
15 years 4 months ago
Enabling Hierarchical and Bulk-Distribution for Watermarked Content
One of the solutions to deter copyright violations consists of embedding hard to detect watermarks in digital media. Current developments have focused on how to embed watermarks, ...
Germano Caronni, Christoph L. Schuba
108
Voted
COMCOM
2007
103views more  COMCOM 2007»
15 years 17 days ago
Inter-autonomous system provisioning for end-to-end bandwidth guarantees
This paper addresses the issue of provisioning end-to-end bandwidth guarantees across multiple Autonomous Systems (ASes). We first review a cascaded model for negotiating and est...
Kin-Hon Ho, Michael P. Howarth, Ning Wang, George ...
99
Voted
ICIP
2009
IEEE
16 years 1 months ago
Secure Distortion Computation Among Untrusting Parties Using Homomorphic Encryption
Alice and Bob possess sequences xn and yn respectively and would like to compute d(xn , yn ) where d(., .) is a distortion measure. However, Alice and Bob do not trust each other ...