Sciweavers

1033 search results - page 57 / 207
» Properties of Exercise Strategies
Sort
View
ICIP
2003
IEEE
15 years 11 months ago
Optimal erasure protection assignment for scalable compressed images with tree-structured dependencies
This paper is concerned with the efficient transmission of scalable compressed images with complex dependency structures over lossy communication channels. Our recent work propose...
Johnson Thie, David Taubman
APLAS
2006
ACM
15 years 4 months ago
Computational Secrecy by Typing for the Pi Calculus
We define and study a distributed cryptographic implementation for an asynchronous pi calculus. At the source level, we adapt simple type systems designed for establishing formal ...
Martín Abadi, Ricardo Corin, Cédric ...
INFOCOM
1999
IEEE
15 years 2 months ago
Cell Identification Codes for Tracking Mobile Users
The minimization of the wireless cost of tracking mobile users is a crucial issue in wireless networks. Some of the previous strategies addressing this issue leave an open gap, by ...
Zohar Naor, Hanoch Levy
ESORICS
2007
Springer
15 years 4 months ago
Modular Access Control Via Strategic Rewriting
Abstract. Security policies, in particular access control, are fundamental elements of computer security. We address the problem of authoring and analyzing policies in a modular wa...
Daniel J. Dougherty, Claude Kirchner, Hél&e...
ICIAR
2009
Springer
15 years 4 months ago
Modeling of Elastic Behavior of 3D Deformable Objects from Range and Tactile Imaging
The paper presents a joint sensing strategy that combines tactile probing and range imaging for the mapping of the elastic properties that characterize 3D deformable objects. A fee...
Ana-Maria Cretu, Pierre Payeur, Emil M. Petriu