Sciweavers

1893 search results - page 184 / 379
» Computational composites
Sort
View
CCS
1998
ACM
15 years 5 months ago
A New Public Key Cryptosystem Based on Higher Residues
This paper describes a new public-key cryptosystem based on the hardness of computing higher residues modulo a composite RSA integer. We introduce two versions of our scheme, one d...
David Naccache, Jacques Stern
85
Voted
ICCV
2005
IEEE
16 years 2 months ago
A Bayesian Approach for Shadow Extraction from a Single Image
This paper addresses the problem of shadow extraction from a single image of a complex natural scene. No simplifying assumption on the camera and the light source other than the L...
Tai-Pang Wu, Chi-Keung Tang
119
Voted
DCOSS
2011
Springer
14 years 15 days ago
Type-safe updating for modular WSN software
—Modular software, in which strongly-separated units of functionality can be independently added to and removed from a node’s running software, offers a promising approach to e...
Barry Porter, Utz Roedig, Geoff Coulson
SAS
2009
Springer
171views Formal Methods» more  SAS 2009»
16 years 1 months ago
Bottom-Up Shape Analysis
In this paper we present a new shape analysis algorithm. The key distinguishing aspect of our algorithm is that it is completely compositional, bottom-up and non-iterative. We pres...
Bhargav S. Gulavani, Supratik Chakraborty, Ganesan...
106
Voted
AINA
2007
IEEE
15 years 7 months ago
Conceptual Framework for a Comprehensive Service Management Middleware
Web services have greatly leveraged the world of Business-to-Business (B2B) communication and promise a lot more through dynamic service composition. In order to compose Web servi...
Farhana H. Zulkernine, Patrick Martin