Sciweavers

6087 search results - page 1090 / 1218
» Knowledge discovery methods
Sort
View
CTRSA
2011
Springer
189views Cryptology» more  CTRSA 2011»
14 years 8 months ago
Ideal Key Derivation and Encryption in Simulation-Based Security
Abstract. Many real-world protocols, such as SSL/TLS, SSH, IPsec, IEEE 802.11i, DNSSEC, and Kerberos, derive new keys from other keys. To be able to analyze such protocols in a com...
Ralf Küsters, Max Tuengerthal
ICCV
2011
IEEE
14 years 4 months ago
Conditional Random Fields for Multi-Camera Object Detection
We formulate a model for multi-class object detection in a multi-camera environment. From our knowledge, this is the first time that this problem is addressed taken into account ...
Xavier Boix, Gemma Roig, Horesh Ben Shitrit, Pasca...
CADE
2011
Springer
14 years 4 months ago
Deciding Security for Protocols with Recursive Tests
Abstract. Security protocols aim at securing communications over public networks. Their design is notoriously difficult and error-prone. Formal methods have shown their usefulness ...
Mathilde Arnaud, Véronique Cortier, St&eacu...
CRV
2011
IEEE
254views Robotics» more  CRV 2011»
14 years 4 months ago
Wavelet Model-based Stereo for Fast, Robust Face Reconstruction
—When reconstructing a specific type or class of object using stereo, we can leverage prior knowledge of the shape of that type of object. A popular class of object to reconstru...
Alan Brunton, Jochen Lang, Eric Dubois, Chang Shu
EMNLP
2011
14 years 4 months ago
Class Label Enhancement via Related Instances
Class-instance label propagation algorithms have been successfully used to fuse information from multiple sources in order to enrich a set of unlabeled instances with class labels...
Zornitsa Kozareva, Konstantin Voevodski, Shang-Hua...
« Prev « First page 1090 / 1218 Last » Next »