Sciweavers

722 search results - page 103 / 145
» Information Theory and Security: Quantitative Information Fl...
Sort
View
ICWE
2003
Springer
15 years 5 months ago
Morphoanalysis of Spanish Texts: Two Applications for Web Pages
The applications described here follow up the works performed in the recent last years by the Data Structures and Computational Linguistics Group at Las Palmas de Gran Canaria Univ...
Octavio Santana Suárez, Zenón Jos&ea...
TMI
2010
132views more  TMI 2010»
14 years 6 months ago
Joint Reconstruction of Image and Motion in Gated Positron Emission Tomography
We present a novel method for joint reconstruction of both image and motion in positron-emission-tomography (PET). Most other methods separate image from motion estimation: They us...
Moritz Blume, Axel Martinez-Möller, Andreas K...
DAC
2007
ACM
16 years 25 days ago
Trusted Hardware: Can It Be Trustworthy?
Processing and storage of confidential or critical information is an every day occurrence in computing systems. The trustworthiness of computing devices has become an important co...
Cynthia E. Irvine, Karl N. Levitt
CCS
2011
ACM
13 years 11 months ago
Trust-based anonymous communication: adversary models and routing algorithms
We introduce a novel model of routing security that incorporates the ordinarily overlooked variations in trust that users have for different parts of the network. We focus on ano...
Aaron Johnson, Paul F. Syverson, Roger Dingledine,...
SP
2008
IEEE
117views Security Privacy» more  SP 2008»
15 years 6 months ago
Anonymous Networking with Minimum Latency in Multihop Networks
The problem of security against timing based traffic analysis in multihop networks is considered in this work. In particular, the relationship between the level of anonymity prov...
Parvathinathan Venkitasubramaniam, Lang Tong