Sciweavers

6434 search results - page 973 / 1287
» Model Transformations with Reference Models
Sort
View
ACNS
2008
Springer
132views Cryptology» more  ACNS 2008»
15 years 10 months ago
Generic Security-Amplifying Methods of Ordinary Digital Signatures
We describe two new paradigms on how to obtain ordinary signatures that are secure against existential forgery under adaptively chosen message attacks (fully-secure, in short), fro...
Jin Li, Kwangjo Kim, Fangguo Zhang, Duncan S. Wong
CEC
2007
IEEE
15 years 10 months ago
A Utile Function Optimizer
Abstract— We recast the problem of unconstrained continuous evolutionary optimization as inference in a fixed graphical model. This approach allows us to address several pervasi...
Christopher K. Monson, Kevin D. Seppi, James L. Ca...
DEXAW
2007
IEEE
104views Database» more  DEXAW 2007»
15 years 10 months ago
An MDA Approach to Implement Personal IR Tools
We introduce TIRA1 , a software architecture for the rapid prototyping of tailored information retrieval (IR) tools. TIRA allows to compose personal IR tools from atomic IR servic...
Sven Meyer zu Eissen, Benno Stein
LICS
2007
IEEE
15 years 10 months ago
Local Action and Abstract Separation Logic
tion and Abstract Separation Logic Cristiano Calcagno Imperial College, London Peter W. O’Hearn Queen Mary, University of London Hongseok Yang Queen Mary, University of London S...
Cristiano Calcagno, Peter W. O'Hearn, Hongseok Yan...
MMM
2007
Springer
123views Multimedia» more  MMM 2007»
15 years 10 months ago
Tamper Proofing 3D Motion Data Streams
This paper presents a fragile watermarking technique to tamper proof (Mocap) motion capture data. The technique visualizes 3D Mocap data as a series of cluster of points. Watermark...
Parag Agarwal, Balakrishnan Prabhakaran