Sciweavers

1307 search results - page 81 / 262
» Follow the intellectual property
Sort
View
PROVSEC
2010
Springer
14 years 11 months ago
Efficient Confirmer Signatures from the "Signature of a Commitment" Paradigm
Generic constructions of designated confirmer signatures follow one of the following two strategies; either produce a digital signature on the message to be signed, then encrypt th...
Laila El Aimani
EDBT
2012
ACM
291views Database» more  EDBT 2012»
13 years 4 months ago
Relevance search in heterogeneous networks
Conventional research on similarity search focuses on measuring the similarity between objects with the same type. However, in many real-world applications, we need to measure the...
Chuan Shi, Xiangnan Kong, Philip S. Yu, Sihong Xie...
EUROPAR
2007
Springer
15 years 7 months ago
Acyclic Preference Systems in P2P Networks
In this work we study preference systems suitable for the Peer-to-Peer paradigm. Most of them fall in one of the three following categories: global, symmetric and complementary. Al...
Anh-Tuan Gai, Dmitry Lebedev, Fabien Mathieu, Fabi...
ILC
2007
Springer
15 years 7 months ago
Towards Model-Checking Programs with Lists
Abstract. We aim at checking safety and temporal properties over models representing the behavior of programs manipulating dynamic singly-linked lists. The properties we consider n...
Alain Finkel, Étienne Lozes, Arnaud Sangnie...
CVPR
2010
IEEE
15 years 6 months ago
Minimum length in the tangent bundle as a model for curve completion
The phenomenon of visual curve completion, where the visual system completes the missing part (e.g., due to occlusion) between two contour fragments, is a major problem in percept...
Guy Ben-Yosef, Ohad Ben Shahar