Sciweavers

1282 search results - page 113 / 257
» Practical Loss-Resilient Codes
Sort
View
118
Voted
IACR
2011
135views more  IACR 2011»
14 years 12 days ago
Charm: A framework for Rapidly Prototyping Cryptosystems
We describe Charm, an extensible framework designed for rapid prototyping of cryptographic systems that utilize the latest advances in cryptography, such as identity and attribute...
Joseph A. Akinyele, Matthew Green, Aviel D. Rubin
148
Voted
MSR
2006
ACM
15 years 6 months ago
MAPO: mining API usages from open source repositories
To improve software productivity, when constructing new software systems, developers often reuse existing class libraries or frameworks by invoking their APIs. Those APIs, however...
Tao Xie, Jian Pei
94
Voted
AAIM
2009
Springer
132views Algorithms» more  AAIM 2009»
15 years 7 months ago
Two-Level Push-Relabel Algorithm for the Maximum Flow Problem
Abstract. We describe a two-level push-relabel algorithm for the maximum flow problem and compare it to the competing codes. The algorithm generalizes a practical algorithm for bi...
Andrew V. Goldberg
104
Voted
ICPR
2010
IEEE
15 years 6 months ago
Comparative Testing of Face Detection Algorithms
Abstract. Face detection (FD) is widely used in interactive user interfaces, in advertising industry, entertainment services, video coding, is necessary first stage for all face r...
Nikolay Degtyarev, Oleg Seredin
NSPW
2003
ACM
15 years 6 months ago
SELF: a transparent security extension for ELF binaries
The ability to analyze and modify binaries is often very useful from a security viewpoint. Security operations one would like to perform on binaries include the ability to extract...
Daniel C. DuVarney, V. N. Venkatakrishnan, Sandeep...