Sciweavers

16404 search results - page 3178 / 3281
» A set coverage problem
Sort
View
CRYPTO
2006
Springer
155views Cryptology» more  CRYPTO 2006»
15 years 7 months ago
A Method for Making Password-Based Key Exchange Resilient to Server Compromise
This paper considers the problem of password-authenticated key exchange (PAKE) in a client-server setting, where the server authenticates using a stored password file, and it is de...
Craig Gentry, Philip D. MacKenzie, Zulfikar Ramzan
CRYPTO
2006
Springer
124views Cryptology» more  CRYPTO 2006»
15 years 7 months ago
Mitigating Dictionary Attacks on Password-Protected Local Storage
We address the issue of encrypting data in local storage using a key that is derived from the user's password. The typical solution in use today is to derive the key from the...
Ran Canetti, Shai Halevi, Michael Steiner
ECCV
2006
Springer
15 years 7 months ago
Comparing Ensembles of Learners: Detecting Prostate Cancer from High Resolution MRI
While learning ensembles have been widely used for various pattern recognition tasks, surprisingly, they have found limited application in problems related to medical image analysi...
Anant Madabhushi, Jianbo Shi, Michael D. Feldman, ...
ER
2006
Springer
109views Database» more  ER 2006»
15 years 7 months ago
Oxone: A Scalable Solution for Detecting Superior Quality Deltas on Ordered Large XML Documents
Recently, a number of relational-based approaches for detecting the changes to XML data have been proposed to address the scalability problem of main memory-based approaches (e.g.,...
Erwin Leonardi, Sourav S. Bhowmick
132
Voted
ESAW
2006
Springer
15 years 7 months ago
Using Constraints and Process Algebra for Specification of First-Class Agent Interaction Protocols
Abstract. Current approaches to multi-agent interaction involve specifying protocols as sets of possible interactions, and hard-coding decision mechanisms into agent programs in or...
Tim Miller, Peter McBurney
« Prev « First page 3178 / 3281 Last » Next »