Sciweavers

2429 search results - page 290 / 486
» Using Aspects to Design a Secure System
Sort
View
PKC
2012
Springer
212views Cryptology» more  PKC 2012»
13 years 5 months ago
Public-Key Cryptography from New Multivariate Quadratic Assumptions
In this work, we study a new multivariate quadratic (MQ) assumption that can be used to construct public-key encryption schemes. In particular, we research in the following two di...
Yun-Ju Huang, Feng-Hao Liu, Bo-Yin Yang
184
Voted
WACV
2002
IEEE
15 years 8 months ago
Mosaic Generation for Under Vehicle Inspection
As the threat of terrorism becomes more prevalent, the need for technological innovations for tighter security rises. Some of the areas where security needs to be increased are at...
Paul E. Dickson, James Li, Zhigang Zhu, Allen R. H...
SIGOPS
2008
116views more  SIGOPS 2008»
15 years 3 months ago
Practical techniques for purging deleted data using liveness information
The layered design of the Linux operating system hides the liveness of file system data from the underlying block layers. This lack of liveness information prevents the storage sy...
David Boutcher, Abhishek Chandra
SSDBM
2003
IEEE
118views Database» more  SSDBM 2003»
15 years 8 months ago
The CenSSIS Image Database
The CenSSIS Image Database System is a scientific database that enables effective data management and collaboration to accelerate fundamental research. This paper describes the d...
Huanmei Wu, Becky Norum, Judith Newmark, Betty Sal...
GECCO
2005
Springer
149views Optimization» more  GECCO 2005»
15 years 8 months ago
There's more to a model than code: understanding and formalizing in silico modeling experience
Mapping biology into computation has both a domain specific aspect – biological theory – and a methodological aspect – model development. Computational modelers have implici...
Janet Wiles, Nicholas Geard, James Watson, Kai Wil...