#### Filter Results:

- Full text PDF available (55)

#### Publication Year

1987

2016

- This year (0)
- Last five years (6)

#### Publication Type

#### Co-author

#### Publication Venue

#### Key Phrases

Learn More

- Stephen R. Tate
- Data Compression Conference
- 1994

This paper examines the compression beneets that can be obtained by reordering the bands of a multispectral image. In particular, we consider a model of lossless image compression in which each band of a multispectral image is coded using a prediction function involving values from a previously coded band of the compression. Clearly, the ordering of the… (More)

- Sachin P. Joglekar, Stephen R. Tate
- International Conference on Information…
- 2004

Intrusion detection systems (IDS) are responsible for monitoring and analyzing host or network activity to detect intrusions in order to protect information from unauthorized access or manipulation. There are two main approaches for intrusion detection: signature-based and anomaly-based. Signature-based detection employs pattern matching to match attack… (More)

- John H. Reif, Stephen R. Tate
- SIAM J. Comput.
- 1987

A Threshold Circuit consists of an acyclic digraph of unbounded fanin, where each node computes a threshold function or its negation. This paper investigates the computational power of Threshold Circuits. A surprising relationship is uncovered between Threshold Circuits and another class of unbounded fanin circuits which are denoted Finite Field Z P (n)… (More)

- Ming-Yang Kao, John H. Reif, Stephen R. Tate
- Inf. Comput.
- 1993

Searching for a goal is a central and extensively studied problem in computer science. In classical searching problems, the cost of a search function is simply the number of queries made to an oracle that knows the position of the goal. In many robotics problems, as well as in problems from other areas, we want to charge a cost proportional to the distance… (More)

- Stephen R. Tate, Ke Xu
- International Conference on Internet Computing
- 2003

—We consider the problem of keeping sensitive data and algorithms contained in a mobile agent from discovery and exploitation by a malicious host. The focus in this paper is on rigorous techniques based on cryptographic protocols. Algesheimer, Cachin, Camenisch, and Karjoth (IEEE Security and Privacy, 2001) devised a secure agent protocol in such a setting,… (More)

- John H. Reif, Stephen R. Tate
- SIAM J. Comput.
- 1989

Division is a fundamental problem for arithmetic and algebraic computation. This paper describes Boolean circuits (of bounded fan-in) for integer division (finding reciprocals) that have size <italic>&Ogr;</italic>(<italic>M</italic>(<italic>n</italic>)) and depth <italic>&Ogr;</italic>(log<italic>n</italic>log log<italic>n</italic>), where… (More)

- He Ge, Stephen R. Tate
- Public Key Cryptography
- 2007

Direct anonymous attestation (DAA) is an anonymous au-thentication scheme adopted by the Trusted Computing Group in its specifications for trusted computing platforms. This paper presents an efficient construction that implements all anonymous authentication features specified in DAA, including authentication with total anonymity, authentication with… (More)

- Vandana Gunupudi, Stephen R. Tate
- AAMAS
- 2006

This paper presents SAgent, a general-purpose mobile agent security framework that is designed to protect the computations of mobile agent applications in potentially hostile environments. SAgent works with the JADE (Java Agent DEvelopment) platform [6], a FIPA-compliant multi-agent environment. SAgent supports modular and mostly orthogonal development of… (More)

- John H. Reif, Stephen R. Tate
- J. Algorithms
- 1997

In this paper, we examine the problem of incrementally evaluating algebraic functions. In particular, if f(x 1 , x 2 , …, x n) = (y 1 , y 2 , …, y m) is an algebraic problem, we consider answering on-line requests of the form ―change input x i to value v'' or ―what is the value of output y j ?'' We first present lower bounds for some simply stated algebraic… (More)

- Ping Yu, Stephen R. Tate
- 21st International Conference on Advanced…
- 2007

We propose an efficient digital signature scheme, which is proved secure under the strong RSA assumption, and can operate in an online/offline manner, doing most of its work in the offline precomputation phase. The online phase, which is performed after the message to be signed is known, is very efficient, requiring only a single modular multiplication.… (More)