Sciweavers

4184 search results - page 728 / 837
» Names of Our Lives
Sort
View
164
Voted
EUROCRYPT
2010
Springer
15 years 6 months ago
Encryption Schemes Secure against Chosen-Ciphertext Selective Opening Attacks
Imagine many small devices send data to a single receiver, encrypted using the receiver’s public key. Assume an adversary that has the power to adaptively corrupt a subset of the...
Serge Fehr, Dennis Hofheinz, Eike Kiltz, Hoeteck W...
CCS
2001
ACM
15 years 6 months ago
Secure Open Systems for Protecting Privacy and Digital Services
This paper describes and analyzes a system architecture that enables consumers to access services and content from multiple providers without jeopardizing the privacy interests of...
David W. Kravitz, Kim-Ee Yeoh, Nicol So
IWLCS
2001
Springer
15 years 6 months ago
Explorations in LCS Models of Stock Trading
In previous papers we have described the basic elements for building an economic model consisting of a group of artificial traders functioning and adapting in an environment conta...
Sonia Schulenburg, Peter Ross
MICCAI
2001
Springer
15 years 6 months ago
Long Bone Panoramas from Fluoroscopic X-ray Images
— This paper presents a new method for creating a single panoramic image of a long bone from several individual fluoroscopic X-ray images. Panoramic images are useful preoperati...
Ziv Yaniv, Leo Joskowicz
NOMS
2000
IEEE
176views Communications» more  NOMS 2000»
15 years 6 months ago
Design and analysis of a proactive application management system (PAMS)
Management of large-scale Network-Centric Systems (NCS) and their applications is an extremely complex and challenging task due to factors such as centralized management architect...
Salim Hariri, Yoonhee Kim