Sciweavers

977 search results - page 126 / 196
» Secret image sharing
Sort
View
JUCS
2010
114views more  JUCS 2010»
14 years 6 months ago
On Reliable Platform Configuration Change Reporting Mechanisms for Trusted Computing Enabled Platforms
: One of the most important use-cases of Trusted Computing is Remote Attestation. It allows platforms to get a trustworthy proof of the loaded software and current configuration of...
Kurt Dietrich
IACR
2011
111views more  IACR 2011»
13 years 11 months ago
Secure Multi-Party Sorting and Applications
Sorting is among the most fundamental and well-studied problems within computer science and a core step of many algorithms. In this article, we consider the problem of constructing...
Kristján Valur Jónsson, Gunnar Kreit...
ICARCV
2002
IEEE
166views Robotics» more  ICARCV 2002»
15 years 4 months ago
Similarity measure determination from NURBS-warping method
With the advances in digital imagery, large accessible data storage, internet repositories, and image applications, information conveyed through images is gaining in importance. T...
Kim Meng Liang, Mandava Rajeswari, Bee Ee Khoo
CHI
2006
ACM
16 years 8 days ago
Virtual information piles for small screen devices
We describe an implementation that has users `flick' notes, images, audio, and video files onto virtual piles beyond the display of small-screen devices. This scheme allows P...
QianYing Wang, Tony Hsieh, Meredith Ringel Morris,...
103
Voted
ICA3PP
2005
Springer
15 years 5 months ago
A Practical Comparison of Cluster Operating Systems Implementing Sequential and Transactional Consistency
Shared Memory is an interesting communication paradigm for SMP machines and clusters. Weak consistency models have been proposed to improve efficiency of shared memory applications...
Stefan Frenz, Renaud Lottiaux, Michael Schött...