Sciweavers

4870 search results - page 79 / 974
» Construction of Wavelets and Applications
Sort
View
ASIACRYPT
2008
Springer
15 years 2 months ago
Limits of Constructive Security Proofs
The collision-resistance of hash functions is an important foundation of many cryptographic protocols. Formally, collision-resistance can only be expected if the hash function in f...
Michael Backes, Dominique Unruh
112
Voted
CONCUR
2008
Springer
15 years 2 months ago
On the Construction of Sorted Reactive Systems
We develop a theory of sorted bigraphical reactive systems. Every application of bigraphs in the literature has required an extension, a sorting, of pure bigraphs. In turn, every s...
Lars Birkedal, Søren Debois, Thomas T. Hild...
112
Voted
VLDB
1991
ACM
171views Database» more  VLDB 1991»
15 years 4 months ago
Language Constructs for Programming Active Databases
: This paper presents database programming language constructs that. can be used to realize a variety of different semantics for rule application in active database syst.ems. The p...
Richard Hull, Dean Jacobs
93
Voted
INFOCOM
2006
IEEE
15 years 6 months ago
On Heterogeneous Overlay Construction and Random Node Selection in Unstructured P2P Networks
— Unstructured p2p and overlay network applications often require that a random graph be constructed, and that some form of random node selection take place over that graph. A ke...
Vivek Vishnumurthy, Paul Francis
107
Voted
WSC
2008
15 years 3 months ago
Simulation and visualization of traffic operations in Augmented Reality for improved planning and design of road construction pr
This paper describes research that investigated the application of 3D Augmented Reality (AR) for animating traffic simulation models in real time to support the planning and desig...
Amir H. Behzadan, Vineet R. Kamat