Sciweavers

9405 search results - page 1788 / 1881
» Computing a Model of Set Theory
Sort
View
IWSEC
2007
Springer
15 years 10 months ago
A Secure Threshold Anonymous Password-Authenticated Key Exchange Protocol
At Indocrypt 2005, Viet et al., [22] have proposed an anonymous password-authenticated key exchange (PAKE) protocol and its threshold construction both of which are designed for cl...
SeongHan Shin, Kazukuni Kobara, Hideki Imai
ACSC
2005
IEEE
15 years 9 months ago
A Two-Pronged Attack on the Dragon of Intractability
One approach to tractably finding a solution to an NP-complete optimisation problem is heuristic, where the solution is inexact but quickly found; another approach is to reduce t...
Stephen Gilmour, Mark Dras
CHARME
2005
Springer
94views Hardware» more  CHARME 2005»
15 years 9 months ago
Verifying Quantitative Properties Using Bound Functions
Abstract. We define and study a quantitative generalization of the traditional boolean framework of model-based specification and verification. In our setting, propositions have...
Arindam Chakrabarti, Krishnendu Chatterjee, Thomas...
135
Voted
TACAS
2005
Springer
124views Algorithms» more  TACAS 2005»
15 years 9 months ago
Localization and Register Sharing for Predicate Abstraction
ion Himanshu Jain1,2 , Franjo Ivanˇci´c1 , Aarti Gupta1 , and Malay K. Ganai1 1 NEC Laboratories America, Inc., 4 Independence Way, Princeton, NJ 08540 2 School of Computer Scien...
Himanshu Jain, Franjo Ivancic, Aarti Gupta, Malay ...
136
Voted
ECCV
2004
Springer
15 years 9 months ago
Statistical Learning of Evaluation Function for ASM/AAM Image Alignment
Alignment between the input and target objects has great impact on the performance of image analysis and recognition system, such as those for medical image and face recognition. A...
Xiangsheng Huang, Stan Z. Li, Yangsheng Wang
« Prev « First page 1788 / 1881 Last » Next »