Sciweavers

1893 search results - page 158 / 379
» Computational composites
Sort
View
CRYPTO
2012
Springer
223views Cryptology» more  CRYPTO 2012»
13 years 3 months ago
Collusion-Preserving Computation
In collusion-free protocols, subliminal communication is impossible and parties are thus unable to communicate “any information beyond what the protocol allows”. Collusion-fre...
Joël Alwen, Jonathan Katz, Ueli Maurer, Vassi...
96
Voted
ICPR
2006
IEEE
16 years 1 months ago
Learning Mixtures of Offline and Online features for Handwritten Stroke Recognition
In this paper we propose a novel scheme to combine offline and online features of handwritten strokes. The stateof-the-art methods in handwritten stroke recognition have used a pr...
C. V. Jawahar, Karteek Alahari, Satya Lahari Putre...
105
Voted
TLCA
2009
Springer
15 years 7 months ago
Partial Orders, Event Structures and Linear Strategies
We introduce a Game Semantics where strategies are partial orders, and composition is a generalization of the merging of orders. Building on this, to bridge between Game Semantics ...
Claudia Faggian, Mauro Piccolo
COORDINATION
2007
Springer
15 years 7 months ago
A Theory for Strong Service Compliance
We investigate, in a process algebraic setting, a new notion of compliance that we call strong service compliance: composed services are strong compliant if their composition is bo...
Mario Bravetti, Gianluigi Zavattaro
TCC
2005
Springer
118views Cryptology» more  TCC 2005»
15 years 6 months ago
On the Relationships Between Notions of Simulation-Based Security
Several compositional forms of simulation-based security have been proposed in the literature, including universal composability, black-box simulatability, and variants thereof. Th...
Anupam Datta, Ralf Küsters, John C. Mitchell,...