Sciweavers

3116 search results - page 239 / 624
» Recovering
Sort
View
143
Voted
ETVC
2008
15 years 2 months ago
Computational Photography: Epsilon to Coded Photography
Computational photography combines plentiful computing, digital sensors, modern optics, actuators, and smart lights to escape the limitations of traditional cameras, enables novel ...
Ramesh Raskar
FC
2008
Springer
81views Cryptology» more  FC 2008»
15 years 2 months ago
Don't Clog the Queue! Circuit Clogging and Mitigation in P2P Anonymity Schemes
At Oakland 2005, Murdoch and Danezis described an attack on the Tor anonymity service that recovers the nodes in a Tor circuit, but not the client. We observe that in a peer-to-pee...
Jon McLachlan, Nicholas Hopper
78
Voted
BCSHCI
2007
15 years 2 months ago
Is an apology enough?: how to resolve trust breakdowns in episodic online interactions
This paper addresses what kind of system allows the victim of a trust breakdown to fairly assess an unintentional offender who is also a benevolent member. Two systems were compar...
Asimina Vasalou, Astrid Hopfensitz, Jeremy Pitt
86
Voted
CATS
2007
15 years 2 months ago
Quantum List Decoding from Quantumly Corrupted Codewords for Classical Block Codes of Polynomially Small Rate
d Abstract) Tomoyuki Yamakami Department of Computer Software, University of Aizu 90 Kami-Iawase, Tsuruga, Ikki-machi, Fukushima 965-8580, Japan Our task of quantum list decoding ...
Tomoyuki Yamakami
88
Voted
CIDR
2007
113views Algorithms» more  CIDR 2007»
15 years 2 months ago
Securing history: Privacy and accountability in database systems
Databases that preserve a historical record of activities and data offer the important benefit of system accountability: past events can be analyzed to detect breaches and maint...
Gerome Miklau, Brian Neil Levine, Patrick Stahlber...