Sciweavers

44 search results - page 8 / 9
» Using equivalence-checking to verify robustness to denial of...
Sort
View
CHARME
2003
Springer
129views Hardware» more  CHARME 2003»
13 years 11 months ago
On the Correctness of an Intrusion-Tolerant Group Communication Protocol
Intrusion-tolerance is the technique of using fault-tolerance to achieve security properties. Assuming that faults, both benign and Byzantine, are unavoidable, the main goal of Int...
Mohamed Layouni, Jozef Hooman, Sofiène Taha...
ICPR
2008
IEEE
14 years 7 months ago
Texture segmentation benchmark
The Prague texture segmentation data-generator and benchmark is a web based (http://mosaic.utia.cas.cz) service designed to mutually compare and rank different texture segmenters,...
Michal Haindl, Stanislav Mikes
ICCNMC
2005
Springer
13 years 11 months ago
SAS: A Scalar Anonymous Communication System
Anonymity technologies have gained more and more attention for communication privacy. In general, users obtain anonymity at a certain cost in an anonymous communication system, whi...
Hongyun Xu, Xinwen Fu, Ye Zhu, Riccardo Bettati, J...
PET
2009
Springer
14 years 23 days ago
Privacy-Preserving Computation and Verification of Aggregate Queries on Outsourced Databases
: © Privacy-Preserving Computation and Verification of Aggregate Queries on Outsourced Databases Brian Thompson, Stuart Haber, William G. Horne, Tomas Sander, Danfeng Yao HP Labor...
Brian Thompson, Stuart Haber, William G. Horne, To...
PVLDB
2008
94views more  PVLDB 2008»
13 years 5 months ago
Dynamic active probing of helpdesk databases
Helpdesk databases are used to store past interactions between customers and companies to improve customer service quality. One common scenario of using helpdesk database is to fi...
Shenghuo Zhu, Tao Li, Zhiyuan Chen, Dingding Wang,...