Sciweavers

15840 search results - page 2983 / 3168
» The Control of Synchronous Systems
Sort
View
JACM
2011
152views more  JACM 2011»
14 years 7 months ago
Robust principal component analysis?
This paper is about a curious phenomenon. Suppose we have a data matrix, which is the superposition of a low-rank component and a sparse component. Can we recover each component i...
Emmanuel J. Candès, Xiaodong Li, Yi Ma, Joh...
152
Voted
JOC
2011
104views more  JOC 2011»
14 years 7 months ago
On the Security of Oscillator-Based Random Number Generators
Physical random number generators (a.k.a. TRNGs) appear to be critical components of many cryptographic systems. Yet, such building blocks are still too seldom provided with a form...
Mathieu Baudet, David Lubicz, Julien Micolod, Andr...
MOBISYS
2011
ACM
14 years 7 months ago
ProxiMate: proximity-based secure pairing using ambient wireless signals
Forming secure associations between wireless devices that do not share a prior trust relationship is an important problem. This paper presents ProxiMate, a system that allows wire...
Suhas Mathur, Robert C. Miller, Alexander Varshavs...
162
Voted
PODC
2011
ACM
14 years 7 months ago
Securing social networks
We present a cryptographic framework to achieve access control, privacy of social relations, secrecy of resources, and anonymity of users in social networks. The main idea is to u...
Michael Backes, Matteo Maffei, Kim Pecina
SAC
2011
ACM
14 years 7 months ago
Tracking continuous topological changes of complex moving regions
A moving region whose location and extend change over time can imply topological changes such as region split and hole formation. To study this phenomenon is useful in many applic...
Hechen Liu, Markus Schneider
« Prev « First page 2983 / 3168 Last » Next »