Sciweavers

2478 search results - page 46 / 496
» Message from the Chair
Sort
View
AUSAI
2009
Springer
15 years 6 months ago
Information-Theoretic Image Reconstruction and Segmentation from Noisy Projections
The minimum message length (MML) principle for inductive inference has been successfully applied to image segmentation where the images are modelled by Markov random fields (MRF)....
Gerhard Visser, David L. Dowe, Imants D. Svalbe
FORTE
2007
15 years 1 months ago
Recovering Repetitive Sub-functions from Observations
This paper proposes an algorithm which, given a set of observations of an existing concurrent system that has repetitive subfunctions, constructs a Message Sequence Charts (MSC) gr...
Guy-Vincent Jourdan, Hasan Ural, Shen Wang, Hü...
SODA
2008
ACM
96views Algorithms» more  SODA 2008»
15 years 1 months ago
Unconditionally reliable message transmission in directed networks
In the unconditionally reliable message transmission (URMT) problem, two non-faulty players, the sender S and the receiver R are part of a synchronous network modeled as a directe...
Bhavani Shankar, Prasant Gopal, Kannan Srinathan, ...
WWW
2011
ACM
14 years 6 months ago
Filtering microblogging messages for social TV
Social TV was named one of the ten most important emerging technologies in 2010 by the MIT Technology Review. Manufacturers of set-top boxes and televisions have recently started ...
Ovidiu Dan, Junlan Feng, Brian D. Davison
FSE
2007
Springer
115views Cryptology» more  FSE 2007»
15 years 6 months ago
Improving the Security of MACs Via Randomized Message Preprocessing
Abstract. “Hash then encrypt” is an approach to message authentication, where first the message is hashed down using an ε-universal hash function, and then the resulting k-bi...
Yevgeniy Dodis, Krzysztof Pietrzak