Sciweavers

1336 search results - page 80 / 268
» Modelling and Analysis of PKI-Based Systems Using Process Ca...
Sort
View
ICALP
2001
Springer
15 years 8 months ago
Symbolic Trace Analysis of Cryptographic Protocols
A cryptographic protocol can be described as a system of concurrent processes, and analysis of the traces generated by this system can be used to verify authentication and secrecy ...
Michele Boreale
142
Voted
KDD
2008
ACM
146views Data Mining» more  KDD 2008»
16 years 3 months ago
Spotting out emerging artists using geo-aware analysis of P2P query strings
Record label companies would like to identify potential artists as early as possible in their careers, before other companies approach the artists with competing contracts. The va...
Noam Koenigstein, Yuval Shavitt, Tomer Tankel
127
Voted
SIGGRAPH
1995
ACM
15 years 7 months ago
Plenoptic modeling: an image-based rendering system
Image-based rendering is a powerful new approach for generating real-time photorealistic computer graphics. It can provide convincing animations without an explicit geometric repr...
Leonard McMillan, Gary Bishop
133
Voted
ICSM
2003
IEEE
15 years 8 months ago
Software Systems Integration and Architectural Analysis - A Case Study
Software systems no longer evolve as separate entities but are also integrated with each other. The purpose of integrating software systems can be to increase user-value or to dec...
Rikard Land, Ivica Crnkovic
105
Voted
ICIAR
2004
Springer
15 years 8 months ago
Face Class Modeling Using Mixture of SVMs
We 1 present a method for face detection which uses a new SVM structure trained in an expert manner in the eigenface space. This robust method has been introduced as a post process...
Julien Meynet, Vlad Popovici, Jean-Philippe Thiran