Sciweavers

2421 search results - page 177 / 485
» Message from the Editor-in-Chief
Sort
View
135
Voted
IACR
2011
105views more  IACR 2011»
14 years 1 months ago
Leakage Tolerant Interactive Protocols
We put forth a framework for expressing security requirements from interactive protocols in the presence of arbitrary leakage. This allows capturing different levels of leakage to...
Nir Bitansky, Ran Canetti, Shai Halevi
CSFW
2012
IEEE
13 years 4 months ago
Securing Interactive Programs
Abstract—This paper studies the foundations of informationflow security for interactive programs. Previous research assumes that the environment is total, that is, it must alway...
Willard Rafnsson, Daniel Hedin, Andrei Sabelfeld
PODC
2012
ACM
13 years 4 months ago
Weak models of distributed computing, with connections to modal logic
This work presents a classification of weak models of distributed computing. We focus on deterministic distributed algorithms, and we study models of computing that are weaker ve...
Lauri Hella, Matti Järvisalo, Antti Kuusisto,...
114
Voted
ICPR
2000
IEEE
16 years 2 months ago
Unsupervised Selection and Estimation of Finite Mixture Models
We propose a new method for fitting mixture models that performs component selection and does not require external initialization. The novelty of our approach includes: a minimum ...
Anil K. Jain, Mário A. T. Figueiredo
APNOMS
2009
Springer
15 years 8 months ago
Group P2P Network Organization in Mobile Ad-Hoc Network
This paper proposes an effective file searching scheme named Group P2P to reduce the number of message transmission. In the Group P2P, peers distinguish Parent Peer from Child Peer...
Rim Haw, Choong Seon Hong, Dae Sun Kim