Sciweavers

790 search results - page 87 / 158
» Hierarchical Group Signatures
Sort
View
92
Voted
ICIP
2005
IEEE
16 years 2 months ago
Similarity-based and perception-based image segmentation
In this paper, we present a segmentation method that provides perceptually relevant partitions without any a priori knowledge of the image content: first a local homogeneity analy...
Jérémy Huart, Pascal Bertolino
134
Voted
VISSOFT
2005
IEEE
15 years 6 months ago
Interactive Exploration of Semantic Clusters
Using visualization and exploration tools can be of great use for the understanding of a software system when only its source code is available. However, understanding a large sof...
Mircea Lungu, Adrian Kuhn, Tudor Gîrba, Mich...
107
Voted
CCS
2008
ACM
15 years 3 months ago
Multi-use unidirectional proxy re-signatures
In 1998, Blaze, Bleumer, and Strauss suggested a cryptographic primitive termed proxy re-signature in which a proxy transforms a signature computed under Alice's secret key in...
Benoît Libert, Damien Vergnaud
118
Voted
ICFP
2008
ACM
16 years 1 months ago
Mixin' up the ML module system
ML modules provide hierarchical namespace management, as well as fine-grained control over the propagation of type information, but they do not allow modules to be broken up into ...
Derek Dreyer, Andreas Rossberg
101
Voted
AINA
2007
IEEE
15 years 7 months ago
Heuristics for Improving Cryptographic Key Assignment in a Hierarchy
In hierarchical distributed systems, shared data access can be controlled by assigning user groups single cryptographic keys that allow high level users derive low level keys, but...
Anne V. D. M. Kayem, Patrick Martin, Selim G. Akl