Sciweavers

20 search results - page 4 / 4
» Weak Bisimulation and Open Maps
Sort
View
ENTCS
2006
150views more  ENTCS 2006»
13 years 5 months ago
Causality Versus True-Concurrency
Category theory has been successfully employed to structure the confusing setup of models and equivalences for concurrency: Winskel and Nielsen have related the standard models nc...
Sibylle B. Fröschle, Slawomir Lasota
DRM
2008
Springer
13 years 7 months ago
RSA-TBOS signcryption with proxy re-encryption
The recent attack on Apple iTunes Digital Rights Management [17] has brought to light the usefulness of proxy re-encryption schemes for Digital Rights Management. It is known that...
Varad Kirtane, C. Pandu Rangan
3DIM
2011
IEEE
12 years 5 months ago
Stereo Reconstruction of Building Interiors with a Vertical Structure Prior
—Image-based computation of a 3D map for an indoor environment is a very challenging task, but also a useful step for vision-based navigation and path planning for autonomous sys...
Bernhard Zeisl, Christopher Zach, Marc Pollefeys
SCN
2010
Springer
144views Communications» more  SCN 2010»
13 years 4 months ago
Generic Constructions of Parallel Key-Insulated Encryption
Exposure of a secret key is a significant threat in practice. As a notion of security against key exposure, Dodis et al. advocated key-insulated security, and proposed concrete k...
Goichiro Hanaoka, Jian Weng

Publication
232views
13 years 3 months ago
Measurement in 802.11 Wireless Networks and its Applications
Ease of deployment, wireless connectivity and ubiquitous mobile on-the-go computing has made the IEEE 802.11 the most widely deployed Wireless Local Area Network (WLAN) sta...
Malik Ahmad Yar Khan