Sciweavers

391 search results - page 33 / 79
» Constructive Equivalence Relations on Computable Probability...
Sort
View
ICMCS
2006
IEEE
119views Multimedia» more  ICMCS 2006»
15 years 7 months ago
Video News Shot Labeling Refinement via Shot Rhythm Models
We present a three-step post-processing method for increasing the precision of video shot labels in the domain of television news. First, we demonstrate that news shot sequences c...
John R. Kender, Milind R. Naphade
ICALP
2005
Springer
15 years 7 months ago
Computational Bounds on Hierarchical Data Processing with Applications to Information Security
Motivated by the study of algorithmic problems in the domain of information security, in this paper, we study the complexity of a new class of computations over a collection of va...
Roberto Tamassia, Nikos Triandopoulos
SIGOPS
1998
123views more  SIGOPS 1998»
15 years 1 months ago
A New Family of Authentication Protocols
Abstract. We present a related family of authentication and digital signature protocols based on symmetric cryptographic primitives which perform substantially better than previous...
Ross J. Anderson, Francesco Bergadano, Bruno Crisp...
POPL
2009
ACM
16 years 2 months ago
Formal certification of code-based cryptographic proofs
As cryptographic proofs have become essentially unverifiable, cryptographers have argued in favor of developing techniques that help tame the complexity of their proofs. Game-base...
Benjamin Grégoire, Gilles Barthe, Santiago ...
IDA
2010
Springer
14 years 12 months ago
Three alternative combinatorial formulations of the theory of evidence
In this paper we introduce three alternative combinatorial formulations of the theory of evidence (ToE), by proving that both plausibility and commonality functions share the stru...
Fabio Cuzzolin