Sciweavers

10910 search results - page 1948 / 2182
» Input modeling using a computer algebra system
Sort
View
128
Voted
SP
2009
IEEE
114views Security Privacy» more  SP 2009»
15 years 11 months ago
Formally Certifying the Security of Digital Signature Schemes
We present two machine-checked proofs of the existential unforgeability under adaptive chosen-message attacks of the Full Domain Hash signature scheme. These proofs formalize the ...
Santiago Zanella Béguelin, Gilles Barthe, B...
156
Voted
CALCO
2009
Springer
176views Mathematics» more  CALCO 2009»
15 years 11 months ago
Complementation of Coalgebra Automata
Abstract. Coalgebra automata, introduced by the second author, generalize the well-known automata that operate on infinite words/streams, trees, graphs or transition systems. This...
Christian Kissig, Yde Venema
FSTTCS
2009
Springer
15 years 11 months ago
Algorithms for Message Ferrying on Mobile ad hoc Networks
ABSTRACT. Message Ferrying is a mobility assisted technique for working around the disconnectedness and sparsity of Mobile ad hoc networks. One of the important questions which ari...
Mostafa H. Ammar, Deeparnab Chakrabarty, Atish Das...
178
Voted
SOCASE
2009
Springer
15 years 11 months ago
Agent-Based Context Consistency Management in Smart Space Environments
Context-aware systems in a smart space environment must be aware of the surrounding contexts and adapt to changing contexts in highly dynamic environments. Data managements of con...
Wan-rong Jih, Jane Yung-jen Hsu, Han-Wen Chang
ICASSP
2008
IEEE
15 years 11 months ago
Multi-feature vector flow for active contour tracking
In order to achieve both fast tracking and accurate object extraction, we present in this paper an original real-time active contour method, incorporating different feature maps i...
Joanna I. Olszewska, Christophe De Vleeschouwer, B...
« Prev « First page 1948 / 2182 Last » Next »