Sciweavers

4037 search results - page 549 / 808
» Routing without ordering
Sort
View
EMMCVPR
2005
Springer
15 years 10 months ago
Brain Image Analysis Using Spherical Splines
We propose a novel technique based on spherical splines for brain surface representation and analysis. This research is strongly inspired by the fact that, for brain surfaces, it i...
Ying He 0001, Xin Li, Xianfeng Gu, Hong Qin
FC
2005
Springer
104views Cryptology» more  FC 2005»
15 years 10 months ago
Event Driven Private Counters
We define and instantiate a cryptographic scheme called “private counters”, which can be used in applications such as preferential voting to express and update preferences (or...
Eu-Jin Goh, Philippe Golle
FC
2005
Springer
157views Cryptology» more  FC 2005»
15 years 10 months ago
Securing Sensitive Data with the Ingrian DataSecure Platform
Recent high profile data thefts have shown that perimeter defenses are not sufficient to secure important customer data. The damage caused by these thefts can be disastrous, and to...
Andrew Koyfman
FC
2005
Springer
120views Cryptology» more  FC 2005»
15 years 10 months ago
Achieving Fairness in Private Contract Negotiation
Abstract. Suppose Alice and Bob are two entities (e.g. agents, organizations, etc.) that wish to negotiate a contract. A contract consists of several clauses, and each party has ce...
Keith B. Frikken, Mikhail J. Atallah
FPL
2005
Springer
131views Hardware» more  FPL 2005»
15 years 10 months ago
An Efficient Approach to Hide the Run-Time Reconfiguration from SW Applications
Dynamically reconfigurable logic is becoming an important design unit in SoC system. A method to make the reconfiguration management transparent to software applications is requir...
Yang Qu, Juha-Pekka Soininen, Jari Nurmi