Sciweavers

2539 search results - page 379 / 508
» Debugging Method Names
Sort
View
FSE
2009
Springer
123views Cryptology» more  FSE 2009»
15 years 2 months ago
Fast and Secure CBC-Type MAC Algorithms
Abstract. The CBC-MAC or cipher block chaining message authentication code, is a well-known method to generate message authentication codes. Unfortunately, it is not forgery-secure...
Mridul Nandi
90
Voted
PPDP
2009
Springer
15 years 2 months ago
Context-based proofs of termination for typed delimited-control operators
We present direct proofs of termination of evaluation for typed delimited-control operators shift and reset using a variant of Tait’s method with context-based reducibility pred...
Malgorzata Biernacka, Dariusz Biernacki
WASA
2009
Springer
186views Algorithms» more  WASA 2009»
15 years 2 months ago
Utopia Providing Trusted Social Network Relationships within an Un-trusted Environment
Abstract. This paper introduces an unobtrusive method and distributed solution set to aid users of on-line social networking sites, by creating a trusted environment in which every...
William Gauvin, Benyuan Liu, Xinwen Fu, Jie Wang
97
Voted
DAGM
2001
Springer
15 years 2 months ago
3D Model Retrieval with Spherical Harmonics and Moments
We consider 3D object retrieval in which a polygonal mesh serves as a query and similar objects are retrieved from a collection of 3D objects. Algorithms proceed first by a normal...
Dietmar Saupe, Dejan V. Vranic
88
Voted
ICN
2001
Springer
15 years 2 months ago
QoS Guaranteed Voice Traffic Multiplexing Scheme over VoIP Network Using DiffServ
The current VoIP transfer methods using low bit rate codes such as G.723.1 and G.729 are still very inefficient due to its small payload size in comparison with its large overhead ...
Eun-Ju Ha, Joon-Heup Kwon, Jong-Tae Park