Sciweavers

2000 search results - page 114 / 400
» Program Transformation and Proof Transformation
Sort
View
134
Voted
ASIACRYPT
2009
Springer
15 years 7 months ago
Proofs of Storage from Homomorphic Identification Protocols
Proofs of storage (PoS) are interactive protocols allowing a client to verify that a server faithfully stores a file. Previous work has shown that proofs of storage can be constru...
Giuseppe Ateniese, Seny Kamara, Jonathan Katz
PEPM
2007
ACM
15 years 9 months ago
Style normalization for canonical X-to-O mappings
An X-to-O mapping takes an XML schema as input and returns an object model as output; this object model is meant for programmatic, schema-aware access to XML data. The provision o...
Ralf Lämmel
ECAI
2006
Springer
15 years 7 months ago
What's a Head Without a Body?
Abstract. Concepts in Answer Set Programming (ASP) are normally defined in terms of atoms. We show that the treatment of atoms and bodies (of rules) as equitable computational obje...
Christian Anger, Martin Gebser, Tomi Janhunen, Tor...
LISP
2008
104views more  LISP 2008»
15 years 3 months ago
On the implementation of automatic differentiation tools
Automatic differentiation is a semantic transformation that applies the rules of differential calculus to source code. It thus transforms a computer program that computes a mathema...
Christian H. Bischof, Paul D. Hovland, Boyana Norr...
130
Voted
MMM
2007
Springer
123views Multimedia» more  MMM 2007»
15 years 9 months ago
Tamper Proofing 3D Motion Data Streams
This paper presents a fragile watermarking technique to tamper proof (Mocap) motion capture data. The technique visualizes 3D Mocap data as a series of cluster of points. Watermark...
Parag Agarwal, Balakrishnan Prabhakaran