Sciweavers

1513 search results - page 259 / 303
» Fibonacci Correction Networks
Sort
View
ESOP
2004
Springer
15 years 9 months ago
Linear Types for Packet Processing
Abstract. We present PacLang: an imperative, concurrent, linearlytyped language designed for expressing packet processing applications. PacLang’s linear type system ensures that ...
Robert Ennals, Richard Sharp, Alan Mycroft
147
Voted
TCC
2004
Springer
173views Cryptology» more  TCC 2004»
15 years 9 months ago
Soundness of Formal Encryption in the Presence of Active Adversaries
Abstract. We present a general method to prove security properties of cryptographic protocols against active adversaries, when the messages exchanged by the honest parties are arbi...
Daniele Micciancio, Bogdan Warinschi
150
Voted
SAC
2010
ACM
15 years 9 months ago
Chemical-inspired self-composition of competing services
This paper aims at pushing the clear relationship between software service composition and chemical dynamics a step forward. We developed a coordination model where services and c...
Mirko Viroli, Matteo Casadei
DISCEX
2003
IEEE
15 years 9 months ago
Detecting Spoofed Packets
Packets sent using the IP protocol include the IP address of the sending host. The recipient directs replies to the sender using this source address. However, the correctness of t...
Steven J. Templeton, Karl E. Levitt
181
Voted
ICIAP
2003
ACM
15 years 9 months ago
PCA vs low resolution images in face verification
Principal Components Analysis (PCA) has been one of the most applied methods for face verification using only 2D information, in fact, PCA is practically the method of choice for ...
Cristina Conde, Antonio Ruiz, Enrique Cabello