Sciweavers

5344 search results - page 221 / 1069
» Privacy-Preserving Set Operations
Sort
View
IVC
2007
122views more  IVC 2007»
15 years 3 months ago
Adaptive surface inspection via interactive evolution
ct 7 An increasingly frequent application of Machine Vision technologies is in automated surface inspection for the detection of defects in 8 manufactured products. Such systems oï...
Praminda Caleb-Solly, Jim E. Smith
130
Voted
USS
2010
15 years 1 months ago
Making Linux Protection Mechanisms Egalitarian with UserFS
UserFS provides egalitarian OS protection mechanisms in Linux. UserFS allows any user--not just the system administrator--to allocate Unix user IDs, to use chroot, and to set up f...
Taesoo Kim, Nickolai Zeldovich
161
Voted
ICUMT
2009
15 years 1 months ago
Simulation analysis of Bluetooth Piconets self-disturbance in industrial applications: A case study
- Wireless systems operating in the 2.4 GHz ISM frequency band and sharing the same environment in an industrial environment are likely to interfere with each other due to simultan...
Muhammad Kamran Khan, Ahmad Ali Tabassam, Farhan A...
176
Voted
KI
2010
Springer
14 years 10 months ago
Focused Belief Revision as a Model of Fallible Relevance-Sensitive Perception
We present a framework for incorporating perception-induced beliefs into the knowledge base of a rational agent. Normally, the agent accepts the propositional content of perception...
Haythem O. Ismail, Nasr Kasrin
106
Voted
IACR
2011
88views more  IACR 2011»
14 years 3 months ago
Targeted Malleability: Homomorphic Encryption for Restricted Computations
We put forward the notion of targeted malleability: given a homomorphic encryption scheme, in various scenarios we would like to restrict the homomorphic computations one can perf...
Dan Boneh, Gil Segev, Brent Waters