Sciweavers

20175 search results - page 52 / 4035
» Is abstraction the key to computing
Sort
View
RP
2009
Springer
136views Control Systems» more  RP 2009»
15 years 5 months ago
Abstract Counterexamples for Non-disjunctive Abstractions
Counterexamples for Non-disjunctive ions K. L. McMillan1 and L. D. Zuck2 1 Cadence Research Labs 2 University of Illinois at Chicago Counterexample-guided abstraction refinement (...
Kenneth L. McMillan, Lenore D. Zuck
106
Voted
ICMCS
2008
IEEE
179views Multimedia» more  ICMCS 2008»
15 years 7 months ago
Key-frame extraction using dominant-set clustering
Key frames play an important role in video abstraction. Clustering is a popular approach for key-frame extraction. In this paper, we propose a novel method for key-frame extractio...
Xianglin Zeng, Weiming Hu, Wanqing Li, Xiaoqin Zha...
86
Voted
CONCUR
2005
Springer
15 years 6 months ago
Timed Spi-Calculus with Types for Secrecy and Authenticity
Abstract. We present a discretely timed spi-calculus. A primitive for key compromise allows us to model key compromise attacks, thus going beyond the standard Dolev–Yao attacker ...
Christian Haack, Alan Jeffrey
95
Voted
JUCS
2008
113views more  JUCS 2008»
15 years 15 days ago
Enhancing ZRTP by using Computational Puzzles
Abstract: In this paper we present and discuss a new approach for securing multimedia communication, which is based on three innovations. The first innovation is the integration of...
Helmut Hlavacs, Wilfried N. Gansterer, Hannes Scha...
86
Voted
AIMS
2007
Springer
15 years 6 months ago
Peer-to-Peer Large-Scale Collaborative Storage Networks
Abstract. This paper presents the idea of a fully decentralized peer-to-peer collaborative network with a robust, scalable and incentive-compatible system enabling storage, retriev...
Thomas Bocek, Burkhard Stiller