Sciweavers

2654 search results - page 427 / 531
» On Pairing Inversion Problems
Sort
View
PPDP
2005
Springer
15 years 9 months ago
A resolution strategy for verifying cryptographic protocols with CBC encryption and blind signatures
Formal methods have proved to be very useful for analyzing cryptographic protocols. However, most existing techniques apply to the case of abstract encryption schemes and pairing....
Véronique Cortier, Michaël Rusinowitch...
SCALESPACE
2005
Springer
15 years 9 months ago
Texture Mapping via Spherical Multi-dimensional Scaling
Abstract. We present a technique for texture mapping arbitrary sphere-like surfaces with minimal distortions by spherical embedding. The embedding is computed using spherical multi...
Asi Elad (Elbaz), Yosi Keller, Ron Kimmel
WADS
2005
Springer
111views Algorithms» more  WADS 2005»
15 years 9 months ago
On Geometric Dilation and Halving Chords
Let G be an embedded planar graph whose edges may be curves. The detour between two points, p and q (on edges or vertices) of G, is the ratio between the shortest path in G between...
Adrian Dumitrescu, Annette Ebbers-Baumann, Ansgar ...
MM
2004
ACM
154views Multimedia» more  MM 2004»
15 years 9 months ago
PLSA-based image auto-annotation: constraining the latent space
We address the problem of unsupervised image auto-annotation with probabilistic latent space models. Unlike most previous works, which build latent space representations assuming ...
Florent Monay, Daniel Gatica-Perez
PODC
2004
ACM
15 years 9 months ago
Computation in networks of passively mobile finite-state sensors
We explore the computational power of networks of small resource-limited mobile agents. We define two new models of computation based on pairwise interactions of finite-state ag...
Dana Angluin, James Aspnes, Zoë Diamadi, Mich...