Sciweavers

819 search results - page 139 / 164
» Using Assumptions to Distribute CTL Model Checking
Sort
View
CRYPTO
2010
Springer
201views Cryptology» more  CRYPTO 2010»
14 years 11 months ago
Protecting Cryptographic Keys against Continual Leakage
Side-channel attacks have often proven to have a devastating effect on the security of cryptographic schemes. In this paper, we address the problem of storing cryptographic keys a...
Ali Juma, Yevgeniy Vahlis
82
Voted
TDP
2008
67views more  TDP 2008»
14 years 10 months ago
Generating Sufficiency-based Non-Synthetic Perturbed Data
The mean vector and covariance matrix are sufficient statistics when the un derlying distribution is multivariate normal. Many type of statistical analyses used in practice rely on...
Krishnamurty Muralidhar, Rathindra Sarathy
RAS
2007
148views more  RAS 2007»
14 years 9 months ago
Including probabilistic target detection attributes into map representations
Range measuring sensors can play an extremely important role in robot navigation. All range measuring devices rely on a ‘detection criterion’ made in the presence of noise, to...
John Mullane, Ebi Jose, Martin David Adams, Wijeru...
111
Voted
AP2PS
2009
IEEE
15 years 1 months ago
Algorithm-Based Fault Tolerance Applied to P2P Computing Networks
—P2P computing platforms are subject to a wide range of attacks. In this paper, we propose a generalisation of the previous disk-less checkpointing approach for fault-tolerance i...
Thomas Roche, Mathieu Cunche, Jean-Louis Roch
73
Voted
SIGECOM
2006
ACM
142views ECommerce» more  SIGECOM 2006»
15 years 4 months ago
Computing the optimal strategy to commit to
In multiagent systems, strategic settings are often analyzed under the assumption that the players choose their strategies simultaneously. However, this model is not always realis...
Vincent Conitzer, Tuomas Sandholm