Sciweavers

3483 search results - page 645 / 697
» Forward
Sort
View
78
Voted
SIGSOFT
1995
ACM
15 years 1 months ago
Precise Interprocedural Chopping
The notion of a program slice, originally introduced by Mark Weiser, is a fundamental operation for addressing many software-engineering problems, including program understanding,...
Thomas W. Reps, Genevieve Rosay
SIGCOMM
1991
ACM
15 years 1 months ago
IP-Based Protocols for Mobile Internetworking
We consider the problem of providing network access to hosts whose physical location changes with time. Such hosts cannot depend on traditional forms of network connectivity and r...
John Ioannidis, Dan Duchamp, Gerald Q. Maguire Jr.
CTRSA
2010
Springer
191views Cryptology» more  CTRSA 2010»
15 years 27 days ago
Making the Diffie-Hellman Protocol Identity-Based
This paper presents a new identity based key agreement protocol. In id-based cryptography (introduced by Adi Shamir in [33]) each party uses its own identity as public key and rece...
Dario Fiore, Rosario Gennaro
CIKM
2009
Springer
15 years 27 days ago
Provenance query evaluation: what's so special about it?
While provenance has been extensively studied in the literature, the efficient evaluation of provenance queries remains an open problem. Traditional query optimization techniques...
Anastasios Kementsietsidis, Min Wang
71
Voted
IPAS
2008
14 years 12 months ago
Deblurring noisy radial-blurred images: spatially adaptive filtering approach
The deblurring of images corrupted by radial blur is studied. This type of blur appears in images acquired during any camera translation having a substantial component orthogonal ...
Giacomo Boracchi, Alessandro Foi, Vladimir Katkovn...