Sciweavers

3820 search results - page 628 / 764
» Bounded Model Debugging
Sort
View
124
Voted
ICALP
2007
Springer
15 years 8 months ago
Checking and Spot-Checking the Correctness of Priority Queues
We revisit the problem of memory checking considered by Blum et al. [3]. In this model, a checker monitors the behavior of a data structure residing in unreliable memory given an a...
Matthew Chu, Sampath Kannan, Andrew McGregor
ICB
2007
Springer
79views Biometrics» more  ICB 2007»
15 years 8 months ago
On Some Performance Indices for Biometric Identification System
This paper investigates a new approach to formulate performance indices of biometric system using information theoretic models. The performance indices proposed here (unlike conven...
Jay Bhatnagar, Ajay Kumar
PAIRING
2007
Springer
148views Cryptology» more  PAIRING 2007»
15 years 8 months ago
Fully Collusion Secure Dynamic Broadcast Encryption with Constant-Size Ciphertexts or Decryption Keys
This paper puts forward new efficient constructions for public-key broadcast encryption that simultaneously enjoy the following properties: receivers are stateless; encryption is c...
Cécile Delerablée, Pascal Paillier, ...
VLDB
2007
ACM
141views Database» more  VLDB 2007»
15 years 8 months ago
UQLIPS: A Real-time Near-duplicate Video Clip Detection System
Near-duplicate video clip (NDVC) detection is an important problem with a wide range of applications such as TV broadcast monitoring, video copyright enforcement, content-based vi...
Heng Tao Shen, Xiaofang Zhou, Zi Huang, Jie Shao, ...
WADS
2007
Springer
89views Algorithms» more  WADS 2007»
15 years 8 months ago
Dynamic TCP Acknowledgment with Sliding Window
The dynamic TCP acknowledgement problem formulated by Dooly et al. has been intensively studied in the area of competitive analysis. However, their framework does not consider the ...
Hisashi Koga