Sciweavers

5457 search results - page 919 / 1092
» Software Component Independence
Sort
View
ACNS
2007
Springer
112views Cryptology» more  ACNS 2007»
15 years 10 months ago
Generic Transformation to Strongly Unforgeable Signatures
Recently, there are several generic transformation techniques proposed for converting unforgeable signature schemes (the message in the forgery has not been signed yet) into strong...
Qiong Huang, Duncan S. Wong, Yiming Zhao
125
Voted
APPROX
2007
Springer
100views Algorithms» more  APPROX 2007»
15 years 10 months ago
Implementing Huge Sparse Random Graphs
Consider a scenario where one desires to simulate the execution of some graph algorithm on random input graphs of huge, perhaps even exponential size. Sampling and storing these h...
Moni Naor, Asaf Nussboim
COCO
2007
Springer
88views Algorithms» more  COCO 2007»
15 years 10 months ago
A New Interactive Hashing Theorem
Interactive hashing, introduced by Naor, Ostrovsky, Venkatesan and Yung (CRYPTO ’92), plays an important role in many cryptographic protocols. In particular, it is a major compo...
Iftach Haitner, Omer Reingold
MIDDLEWARE
2007
Springer
15 years 10 months ago
Flexible matching and ranking of web service advertisements
With the growing number of service advertisements in service marketplaces, there is a need for matchmakers which select and rank functionally similar services based on nonfunction...
Navid Ahmadi, Walter Binder
127
Voted
SCIA
2007
Springer
182views Image Analysis» more  SCIA 2007»
15 years 10 months ago
The Statistical Properties of Local Log-Contrast in Natural Images
Abstract. The study of natural image statistics considers the statistical properties of large collections of images from natural scenes, and has applications in image processing, c...
Jussi T. Lindgren, Jarmo Hurri, Aapo Hyvärine...