Sciweavers

1230 search results - page 136 / 246
» On Abstraction in Scenarios
Sort
View
ESORICS
2009
Springer
16 years 1 months ago
Secure Evaluation of Private Linear Branching Programs with Medical Applications
Abstract. Diagnostic and classification algorithms play an important role in data analysis, with applications in areas such as health care, fault diagnostics, or benchmarking. Bran...
Mauro Barni, Pierluigi Failla, Vladimir Kolesnikov...
118
Voted
ICIAP
2009
ACM
16 years 1 months ago
Real-Time Online Video Object Silhouette Extraction Using Graph Cuts on the GPU
Abstract. Being able to find the silhouette of an object is a very important front-end processing step for many high-level computer vision techniques, such as Shape-from-Silhouette...
Zachary A. Garrett, Hideo Saito
107
Voted
TCC
2009
Springer
177views Cryptology» more  TCC 2009»
16 years 1 months ago
Composability and On-Line Deniability of Authentication
Abstract. Protocols for deniable authentication achieve seemingly paradoxical guarantees: upon completion of the protocol the receiver is convinced that the sender authenticated th...
Yevgeniy Dodis, Jonathan Katz, Adam Smith, Shabsi ...
126
Voted
PERCOM
2009
ACM
16 years 1 months ago
RFID Based Localization for a Miniaturized Robotic Platform for Wireless Protocols Evaluation
Abstract--The proliferation of wireless-enabled portable computing devices has spurred a growing need for efficient and powerful networking protocols. The key challenge in the deve...
Vikram P. Munishwar, Shailendra Singh 0003, Christ...
94
Voted
OSDI
2002
ACM
16 years 1 months ago
An Integrated Experimental Environment for Distributed Systems and Networks
Three experimental environments traditionally support network and distributed systems research: network emulators, network simulators, and live networks. The continued use of mult...
Brian White, Jay Lepreau, Leigh Stoller, Robert Ri...