Sciweavers

255 search results - page 24 / 51
» Generalizing Consistency and other Constraint Properties to ...
Sort
View
FSEN
2007
Springer
15 years 4 months ago
Is Your Security Protocol on Time ?
Abstract. In this paper we offer a novel methodology for verifying correctness of (timed) security protocols. The idea consists in computing the time of a correct execution of a s...
Gizela Jakubowska, Wojciech Penczek
79
Voted
APPROX
2010
Springer
168views Algorithms» more  APPROX 2010»
14 years 11 months ago
Differential Privacy and the Fat-Shattering Dimension of Linear Queries
In this paper, we consider the task of answering linear queries under the constraint of differential privacy. This is a general and well-studied class of queries that captures oth...
Aaron Roth
WWW
2005
ACM
15 years 11 months ago
Web service interfaces
We present a language for specifying web service interfaces. A web service interface puts three kinds of constraints on the users of the service. First, the interface specifies th...
Dirk Beyer, Arindam Chakrabarti, Thomas A. Henzing...
95
Voted
CP
2008
Springer
14 years 12 months ago
Model Restarts for Structural Symmetry Breaking
ctural abstractions that were introduced in [17]. Compared with other symmetry-breaking techniques, the big advantage of dynamic symmetry breaking is that it can accommodate dynami...
Daniel S. Heller, Aurojit Panda, Meinolf Sellmann,...

Publication
255views
16 years 5 months ago
3-D Shape Measurement Method with Modulated Slit Light Robust for Interreflection and Subsurface Scattering
We propose a method to accurately measure the shape of objects by suppressing the effect of indirect reflection caused by the interreflection and subsurface scattering. We use a ...
Tatsuhiko Furuse, Shinsaku Hiura, Kosuke Sato