Sciweavers

2539 search results - page 419 / 508
» Debugging Method Names
Sort
View
CTRSA
2011
Springer
189views Cryptology» more  CTRSA 2011»
14 years 1 months ago
Ideal Key Derivation and Encryption in Simulation-Based Security
Abstract. Many real-world protocols, such as SSL/TLS, SSH, IPsec, IEEE 802.11i, DNSSEC, and Kerberos, derive new keys from other keys. To be able to analyze such protocols in a com...
Ralf Küsters, Max Tuengerthal
ICDE
2011
IEEE
234views Database» more  ICDE 2011»
14 years 1 months ago
Massively parallel XML twig filtering using dynamic programming on FPGAs
Abstract— In recent years, XML-based Publish-Subscribe Systems have become popular due to the increased demand of timely event-notification. Users (or subscribers) pose complex ...
Roger Moussalli, Mariam Salloum, Walid A. Najjar, ...
ICCV
2011
IEEE
13 years 10 months ago
Automated Articulated Structure and 3D Shape Recovery from Point Correspondences
In this paper we propose a new method for the simultaneous segmentation and 3D reconstruction of interest point based articulated motion. We decompose a set of point tracks into r...
Joao Fayad, Chris Russell, Lourdes Agapito
ICCV
2011
IEEE
13 years 10 months ago
Conditional Random Fields for Multi-Camera Object Detection
We formulate a model for multi-class object detection in a multi-camera environment. From our knowledge, this is the first time that this problem is addressed taken into account ...
Xavier Boix, Gemma Roig, Horesh Ben Shitrit, Pasca...
ICC
2011
IEEE
206views Communications» more  ICC 2011»
13 years 9 months ago
Unveiling the Content-Centric Features of TCP
—Content-centric networking has been proposed as a new networking paradigm that is centered around the distribution of content. A key idea of content-centric networks is to addre...
Suman Srinivasan, Ivica Rimac, Volker Hilt, Moritz...