Sciweavers

5695 search results - page 936 / 1139
» Using Many Cameras as One
Sort
View
ESORICS
2009
Springer
16 years 5 months ago
Cumulative Attestation Kernels for Embedded Systems
1 There are increasing deployments of networked embedded systems and rising threats of malware intrusions on such systems. To mitigate this threat, it is desirable to enable common...
Michael LeMay, Carl A. Gunter
TCC
2009
Springer
141views Cryptology» more  TCC 2009»
16 years 5 months ago
Weak Verifiable Random Functions
Verifiable random functions (VRFs), introduced by Micali, Rabin and Vadhan, are pseudorandom functions in which the owner of the seed produces a public-key that constitutes a commi...
Zvika Brakerski, Shafi Goldwasser, Guy N. Rothblum...
KDD
2004
ACM
114views Data Mining» more  KDD 2004»
16 years 5 months ago
Scalable mining of large disk-based graph databases
Mining frequent structural patterns from graph databases is an interesting problem with broad applications. Most of the previous studies focus on pruning unfruitful search subspac...
Chen Wang, Wei Wang 0009, Jian Pei, Yongtai Zhu, B...
CHI
2004
ACM
16 years 5 months ago
The usability of massively multiplayer online roleplaying games: designing for new users
This study examines the usability challenges faced by new players of massively multiplayer online role-playing games (MMORPGs), one of the fastest-growing segments of the video ga...
Steve Cornett
STOC
2005
ACM
96views Algorithms» more  STOC 2005»
16 years 5 months ago
Every monotone graph property is testable
A graph property is called monotone if it is closed under taking (not necessarily induced) subgraphs (or, equivalently, if it is closed under removal of edges and vertices). Many ...
Noga Alon, Asaf Shapira