Sciweavers

1893 search results - page 158 / 379
» Computational composites
Sort
View
133
Voted
CRYPTO
2012
Springer
223views Cryptology» more  CRYPTO 2012»
13 years 7 months ago
Collusion-Preserving Computation
In collusion-free protocols, subliminal communication is impossible and parties are thus unable to communicate “any information beyond what the protocol allows”. Collusion-fre...
Joël Alwen, Jonathan Katz, Ueli Maurer, Vassi...
ICPR
2006
IEEE
16 years 5 months ago
Learning Mixtures of Offline and Online features for Handwritten Stroke Recognition
In this paper we propose a novel scheme to combine offline and online features of handwritten strokes. The stateof-the-art methods in handwritten stroke recognition have used a pr...
C. V. Jawahar, Karteek Alahari, Satya Lahari Putre...
TLCA
2009
Springer
15 years 11 months ago
Partial Orders, Event Structures and Linear Strategies
We introduce a Game Semantics where strategies are partial orders, and composition is a generalization of the merging of orders. Building on this, to bridge between Game Semantics ...
Claudia Faggian, Mauro Piccolo
141
Voted
COORDINATION
2007
Springer
15 years 10 months ago
A Theory for Strong Service Compliance
We investigate, in a process algebraic setting, a new notion of compliance that we call strong service compliance: composed services are strong compliant if their composition is bo...
Mario Bravetti, Gianluigi Zavattaro
TCC
2005
Springer
118views Cryptology» more  TCC 2005»
15 years 10 months ago
On the Relationships Between Notions of Simulation-Based Security
Several compositional forms of simulation-based security have been proposed in the literature, including universal composability, black-box simulatability, and variants thereof. Th...
Anupam Datta, Ralf Küsters, John C. Mitchell,...