Sciweavers

260 search results - page 52 / 52
» Modeling Mental States in the Analysis of Multiagent Systems...
Sort
View
IMAGING
2003
13 years 7 months ago
Group Theoretical Invariants in Color Image Processing
Many image formation processes are complex interactions of several sub-processes and the analysis of the resulting images requires often to separate the influence of these sub-pr...
Reiner Lenz, Linh Viet Tran, Thanh Hai Bui
WSC
2004
13 years 7 months ago
An Urban Terrain Abstraction to Support Decisionmaking Using Recursive Simulation
Recursive simulation is the technique of having simulated decisionmakers themselves use simulation to inform their decisionmaking. Issues of efficiency require that the recursive ...
John B. Gilmer Jr.
CCS
2010
ACM
13 years 2 months ago
Practical leakage-resilient pseudorandom generators
Cryptographic systems and protocols are the core of many Internet security procedures (such as SSL, SSH, IPSEC, DNSSEC, secure mail, etc.). At the heart of all cryptographic funct...
Yu Yu, François-Xavier Standaert, Olivier P...
CONEXT
2009
ACM
13 years 6 months ago
StarClique: guaranteeing user privacy in social networks against intersection attacks
Building on the popularity of online social networks (OSNs) such as Facebook, social content-sharing applications allow users to form communities around shared interests. Millions...
Krishna P. N. Puttaswamy, Alessandra Sala, Ben Y. ...
CANS
2006
Springer
136views Cryptology» more  CANS 2006»
13 years 9 months ago
Watermarking Essential Data Structures for Copyright Protection
Software watermarking is a new research area that aims at providing copyright protection for commercial software. It minimizes software piracy by hiding copyright signatures inside...
Qutaiba Albluwi, Ibrahim Kamel