Sciweavers

13476 search results - page 35 / 2696
» Learning from Streams
Sort
View
ESORICS
2002
Springer
16 years 1 months ago
Analysing a Stream Authentication Protocol Using Model Checking
Abstract. In this paper, we consider how one can analyse a stream authentication protocol using model checking techniques. In particular, we will be focusing on the Timed Efficient...
Philippa J. Broadfoot, Gavin Lowe
ASIACRYPT
2008
Springer
15 years 4 months ago
A New Attack on the LEX Stream Cipher
Abstract. In [6], Biryukov presented a new methodology of stream cipher design, called leak extraction. The stream cipher LEX, based on this methodology and on the AES block cipher...
Orr Dunkelman, Nathan Keller
CVDB
2005
ACM
15 years 3 months ago
A live multimedia stream querying system
Querying live media streams captured by various sensors is becoming a challenging problem, due to the data heterogeneity and the lack of a unifying data model capable of accessing...
Bin Liu, Amarnath Gupta, Ramesh Jain
128
Voted
CORR
2010
Springer
126views Education» more  CORR 2010»
15 years 2 months ago
Well-definedness of Streams by Transformation and Termination
Streams are infinite sequences over a given data type. A stream specification is a set of equations intended to define a stream. We propose a transformation from such a stream spec...
Hans Zantema
MICAI
2005
Springer
15 years 7 months ago
Modelling Human Intelligence: A Learning Mechanism
We propose a novel, high-level model of human learning and cognition, based on association forming. The model configures any input data stream featuring a high incidence of repeti...
Enrique Carlos Segura, Robin W. Whitty