Sciweavers

9687 search results - page 1904 / 1938
» On Natural Mobility Models
Sort
View
CCS
2010
ACM
15 years 23 hour ago
On the soundness of authenticate-then-encrypt: formalizing the malleability of symmetric encryption
A communication channel from an honest sender A to an honest receiver B can be described as a system with three interfaces labeled A, B, and E (the adversary), respectively, where...
Ueli Maurer, Björn Tackmann
ECCV
2010
Springer
15 years 16 hour ago
Efficient Computation of Scale-Space Features for Deformable Shape Correspondences
Abstract. With the rapid development of fast data acquisition techniques, 3D scans that record the geometric and photometric information of deformable objects are routinely acquire...
Tingbo Hou, Hong Qin
ERCIMDL
2010
Springer
132views Education» more  ERCIMDL 2010»
15 years 14 hour ago
A Visual Digital Library Approach for Time-Oriented Scientific Primary Data
Abstract. Digital Library support for textual and certain types of nontextual documents has significantly advanced over the last years. While Digital Library support implies many a...
Jürgen Bernard, Jan Brase, Dieter W. Fellner,...
ESORICS
2010
Springer
15 years 14 hour ago
D(e|i)aling with VoIP: Robust Prevention of DIAL Attacks
We carry out attacks using Internet services that aim to keep telephone devices busy, hindering legitimate callers from gaining access. We use the term DIAL (Digitally Initiated A...
Alexandros Kapravelos, Iasonas Polakis, Elias Atha...
AI
2008
Springer
14 years 12 months ago
Speculative plan execution for information gathering
The execution performance of an information gathering plan can suffer significantly due to remote I/O latencies. A streaming dataflow model of execution addresses the problem to s...
Greg Barish, Craig A. Knoblock
« Prev « First page 1904 / 1938 Last » Next »