Sciweavers

3909 search results - page 480 / 782
» Extreme Model Checking
Sort
View
CORR
2004
Springer
144views Education» more  CORR 2004»
15 years 4 months ago
Iterative Quantization Using Codes On Graphs
We study codes on graphs combined with an iterative message passing algorithm for quantization. Specifically, we consider the binary erasure quantization (BEQ) problem which is th...
Emin Martinian, Jonathan S. Yedidia
141
Voted
CORR
2011
Springer
142views Education» more  CORR 2011»
14 years 12 months ago
A Logical Method for Policy Enforcement over Evolving Audit Logs
We present an iterative algorithm for enforcing policies represented in a first-order logic, which can, in particular, express all transmission-related clauses in the HIPAA Priva...
Deepak Garg, Limin Jia, Anupam Datta
123
Voted
IJNSEC
2010
133views more  IJNSEC 2010»
14 years 11 months ago
Verifiable Attribute Based Encryption
In this paper, we construct two verifiable attribute-based encryption (VABE) schemes. One is with a single authority, and the other is with multi authorities. Not only our schemes ...
Qiang Tang, Dongyao Ji
POPL
2012
ACM
14 years 15 days ago
Deciding choreography realizability
Since software systems are becoming increasingly more concurrent and distributed, modeling and analysis of interactions among their components is a crucial problem. In several app...
Samik Basu, Tevfik Bultan, Meriem Ouederni
CVPR
2008
IEEE
16 years 7 months ago
Progressive search space reduction for human pose estimation
The objective of this paper is to estimate 2D human pose as a spatial configuration of body parts in TV and movie video shots. Such video material is uncontrolled and extremely ch...
Andrew Zisserman, Manuel J. Marín-Jim&eacut...