Sciweavers

1628 search results - page 61 / 326
» Compiler Construction Using Scheme
Sort
View
ISMIS
1997
Springer
15 years 4 months ago
Knowledge-Based Image Retrieval with Spatial and Temporal Constructs
e about image features can be expressed as a hierarchical structure called a Type Abstraction Hierarchy (TAH). TAHs can be generated automatically by clustering algorithms based on...
Wesley W. Chu, Alfonso F. Cardenas, Ricky K. Taira
DAGM
2006
Springer
15 years 3 months ago
Diffusion-Like Reconstruction Schemes from Linear Data Models
In this paper we extend anisotropic diffusion with a diffusion tensor to be applicable to data that is well modeled by linear models. We focus on its variational theory, and invest...
Hanno Scharr
ICICS
2001
Springer
15 years 4 months ago
Fair Electronic Cash Based on a Group Signature Scheme
Several new group signature schemes have been proposed in recent years. In addition, several applications for group signatures (including electronic cash) have been suggested. A ne...
Greg Maitland, Colin Boyd
CRYPTO
2004
Springer
121views Cryptology» more  CRYPTO 2004»
15 years 5 months ago
A New Paradigm of Hybrid Encryption Scheme
In this paper, we show that a key encapsulation mechanism (KEM) does not have to be IND-CCA secure in the construction of hybrid encryption schemes, as was previously believed. Tha...
Kaoru Kurosawa, Yvo Desmedt
CTRSA
2009
Springer
158views Cryptology» more  CTRSA 2009»
15 years 6 months ago
Square, a New Multivariate Encryption Scheme
We propose and analyze a multivariate encryption scheme that uses odd characteristic and an embedding in its construction. This system has a very simple core map F(X) = X2 , allowi...
Crystal Clough, John Baena, Jintai Ding, Bo-Yin Ya...