Sciweavers

661 search results - page 62 / 133
» Robustness Guarantees for Anonymity
Sort
View
92
Voted
CARDIS
2008
Springer
113views Hardware» more  CARDIS 2008»
15 years 2 months ago
The Trusted Execution Module: Commodity General-Purpose Trusted Computing
This paper introduces the Trusted Execution Module (TEM); a high-level specification for a commodity chip that can execute usersupplied procedures in a trusted environment. The TEM...
Victor Costan, Luis F. G. Sarmenta, Marten van Dij...
MASCOTS
2004
15 years 2 months ago
Reliable Response Delivery in Peer-to-Peer Systems
Unstructured peer-to-peer (P2P) system is the prevalent model in today's P2P system. In such systems, a response is sent along the same path that carried the incoming query m...
Xiaomei Liu, Yunhao Liu, Li Xiao
DMS
2010
146views Multimedia» more  DMS 2010»
14 years 11 months ago
Electronic Payment and Online Gaming
We will evaluate electronic payment (ePayment) systems by employing a use-value analysis. The key success factors of ePayment systems are security and flexibility. Not surprisingly...
Gerald Draxler, Johannes Sametinger, Andreas Wiesa...
120
Voted
VTC
2010
IEEE
176views Communications» more  VTC 2010»
14 years 11 months ago
Exploiting Redundancy in Iterative H.264 Joint Source and Channel Decoding For Robust Video Transmission
— In this paper we propose joint optimisation of soft-bit assisted iterative joint source and channel decoding with the aid of our proposed EXIT chart optimised redundant source ...
Nasruminallah, Lajos Hanzo
84
Voted
CDC
2009
IEEE
138views Control Systems» more  CDC 2009»
15 years 5 months ago
Bilevel programming for analysis of low-complexity control of linear systems with constraints
— In this paper we use bilevel programming to find the maximum difference between a reference controller and a low-complexity controller in terms of the infinitynorm difference...
Henrik Manum, Colin Neil Jones, Johan Löfberg...