Sciweavers

7918 search results - page 258 / 1584
» Model Composition Directives
Sort
View
CANS
2007
Springer
150views Cryptology» more  CANS 2007»
15 years 10 months ago
Perfectly Secure Message Transmission in Directed Networks Tolerating Threshold and Non Threshold Adversary
Abstract. In this paper we study Perfectly Secure Message Transmission (PSMT) between a sender S and a receiver R, connected in a directed synchronous network through multiple para...
Arpita Patra, Bhavani Shankar, Ashish Choudhary, K...
VMCAI
2009
Springer
15 years 11 months ago
Mixed Transition Systems Revisited
—A variety of partial modeling formalisms, aimed re and reason about abstractions, have been proposed. Some, e.g., Kripke Modal Transition Systems (KMTSs) put strong restrictions...
Ou Wei, Arie Gurfinkel, Marsha Chechik
256
Voted
VCIP
2000
128views Communications» more  VCIP 2000»
15 years 5 months ago
Video Quality Experts Group: current results and future directions
Subjective assessment methods have been used reliably for many years to evaluate video quality. They continue to provide the most reliable assessments compared to objective method...
Ann M. Rohaly, Philip J. Corriveau, John M. Libert...
CSL
1999
Springer
15 years 8 months ago
A Truly Concurrent Semantics for a Simple Parallel Programming Language
Abstract. This paper represents the beginning of a study aimed at devising semantic models for true concurrency that provide clear distinctions between concurrency, parallelism and...
Paul Gastin, Michael W. Mislove
MMSEC
2005
ACM
129views Multimedia» more  MMSEC 2005»
15 years 9 months ago
Exposing digital forgeries by detecting inconsistencies in lighting
When creating a digital composite of, for example, two people standing side-by-side, it is often difficult to match the lighting conditions from the individual photographs. Lighti...
Micah K. Johnson, Hany Farid