Sciweavers

814 search results - page 62 / 163
» Generic Model Abstraction from Examples
Sort
View
NDSS
2003
IEEE
15 years 8 months ago
Proxy Cryptography Revisited
In this work we revisit and formally study the notion of proxy cryptography. Intuitively, various proxy functions allow two cooperating parties F (the “FBI”) and P (the “pro...
Anca-Andreea Ivan, Yevgeniy Dodis
SEMWEB
2010
Springer
15 years 1 months ago
How to Reuse a Faceted Classification and Put It on the Semantic Web
There are ontology domain concepts that can be represented according to multiple alternative classification criteria. Current ontology modeling guidelines do not explicitly conside...
Bene Rodriguez-Castro, Hugh Glaser, Leslie Carr
PAMI
2010
337views more  PAMI 2010»
15 years 1 months ago
Single-Image Super-Resolution Using Sparse Regression and Natural Image Prior
—This paper proposes a framework for single-image super-resolution. The underlying idea is to learn a map from input low-resolution images to target high-resolution images based ...
Kwang In Kim, Younghee Kwon
CRYPTO
2004
Springer
127views Cryptology» more  CRYPTO 2004»
15 years 8 months ago
IPAKE: Isomorphisms for Password-Based Authenticated Key Exchange
Abstract. In this paper we revisit one of the most popular passwordbased key exchange protocols, namely the OKE (for Open Key Exchange) scheme, proposed by Luck in 1997. Our result...
Dario Catalano, David Pointcheval, Thomas Pornin
RULEML
2004
Springer
15 years 8 months ago
A Defeasible Logic Reasoner for the Semantic Web
Abstract. Defeasible reasoning is a rule-based approach for efficient reasoning with incomplete and inconsistent information. Such reasoning is, among others, useful for ontology i...
Nick Bassiliades, Grigoris Antoniou, Ioannis P. Vl...