Sciweavers

255 search results - page 24 / 51
» Generalizing Consistency and other Constraint Properties to ...
Sort
View
90
Voted
FSEN
2007
Springer
15 years 6 months ago
Is Your Security Protocol on Time ?
Abstract. In this paper we offer a novel methodology for verifying correctness of (timed) security protocols. The idea consists in computing the time of a correct execution of a s...
Gizela Jakubowska, Wojciech Penczek
95
Voted
APPROX
2010
Springer
168views Algorithms» more  APPROX 2010»
15 years 2 months ago
Differential Privacy and the Fat-Shattering Dimension of Linear Queries
In this paper, we consider the task of answering linear queries under the constraint of differential privacy. This is a general and well-studied class of queries that captures oth...
Aaron Roth
WWW
2005
ACM
16 years 1 months ago
Web service interfaces
We present a language for specifying web service interfaces. A web service interface puts three kinds of constraints on the users of the service. First, the interface specifies th...
Dirk Beyer, Arindam Chakrabarti, Thomas A. Henzing...
110
Voted
CP
2008
Springer
15 years 2 months ago
Model Restarts for Structural Symmetry Breaking
ctural abstractions that were introduced in [17]. Compared with other symmetry-breaking techniques, the big advantage of dynamic symmetry breaking is that it can accommodate dynami...
Daniel S. Heller, Aurojit Panda, Meinolf Sellmann,...
100
Voted

Publication
255views
16 years 7 months ago
3-D Shape Measurement Method with Modulated Slit Light Robust for Interreflection and Subsurface Scattering
We propose a method to accurately measure the shape of objects by suppressing the effect of indirect reflection caused by the interreflection and subsurface scattering. We use a ...
Tatsuhiko Furuse, Shinsaku Hiura, Kosuke Sato