Sciweavers

4397 search results - page 760 / 880
» Relational Algebra Operations
Sort
View
VSTTE
2012
Springer
13 years 6 months ago
Deciding Functional Lists with Sublist Sets
Motivated by the problem of deciding verification conditions for the verification of functional programs, we present new decision procedures for automated reasoning about functio...
Thomas Wies, Marco Muñiz, Viktor Kuncak
CRYPTO
2012
Springer
254views Cryptology» more  CRYPTO 2012»
13 years 1 months ago
Breaking and Repairing GCM Security Proofs
Abstract. In this paper, we study the security proofs of GCM (Galois/Counter Mode of Operation). We first point out that a lemma, which is related to the upper bound on the probab...
Tetsu Iwata, Keisuke Ohashi, Kazuhiko Minematsu
TON
2012
13 years 1 months ago
Abnormally Malicious Autonomous Systems and Their Internet Connectivity
—While many attacks are distributed across botnets, investigators and network operators have recently identified malicious networks through high profile autonomous system (AS) ...
Craig A. Shue, Andrew J. Kalafut, Minaxi Gupta
CVPR
2012
IEEE
13 years 1 months ago
Discriminative virtual views for cross-view action recognition
We propose an approach for cross-view action recognition by way of ‘virtual views’ that connect the action descriptors extracted from one (source) view to those extracted from...
Ruonan Li, Todd Zickler
CVPR
2009
IEEE
1234views Computer Vision» more  CVPR 2009»
16 years 6 months ago
Robustifying Eye Center Localization by Head Pose Cues
Head pose and eye location estimation are two closely related issues which refer to similar application areas. In recent years, these problems have been studied individually in ...
Roberto Valenti, Theo Gevers, Zeynep Yücel