Sciweavers

10819 search results - page 213 / 2164
» Addition and multiplication of sets
Sort
View
ACNS
2005
Springer
116views Cryptology» more  ACNS 2005»
15 years 6 months ago
Two-Server Password-Only Authenticated Key Exchange
Typical protocols for password-based authentication assume a single server which stores all the information (e.g., the password) necessary to authenticate a user. Unfortunately, a...
Jonathan Katz, Philip D. MacKenzie, Gelareh Taban,...
RAID
2001
Springer
15 years 5 months ago
Probabilistic Alert Correlation
With the growing deployment of host and network intrusion detection systems, managing reports from these systems becomes critically important. We present a probabilistic approach t...
Alfonso Valdes, Keith Skinner
DAWAK
1999
Springer
15 years 5 months ago
Dynamic Data Warehouse Design
A data warehouse DW can be seen as a set of materialized views de ned over remote base relations. When a query is posed, it is evaluated locally, using the materialized views, wi...
Dimitri Theodoratos, Timos K. Sellis
SI3D
1992
ACM
15 years 4 months ago
Interactive Volume Rendering on a Multicomputer
Direct volume rendering is a computationally intensive operation that has become a valued and often preferred visualization tool. For maximal data comprehension, interactive manip...
Ulrich Neumann
96
Voted
SPIESR
2004
171views Database» more  SPIESR 2004»
15 years 2 months ago
Interactive segmentation with hidden object-based annotations: toward smart media
In this paper a novel "Smart Media" concept for semantic-based multimedia security and management is proposed. This concept is based on interactive object segmentation (...
Yuriy Rytsar, Sviatoslav Voloshynovskiy, Fré...