Sciweavers

11949 search results - page 154 / 2390
» Some results on (a:b)-choosability
Sort
View
TGC
2007
Springer
15 years 7 months ago
Computational Soundness of Equational Theories (Tutorial)
Abstract. We study the link between formal and cryptographic models for security protocols in the presence of passive and adaptive adversaries. We first describe the seminal resul...
Steve Kremer
APCCAS
2006
IEEE
249views Hardware» more  APCCAS 2006»
15 years 7 months ago
Uncertainty Management for Estimation in Dynamical Systems
— A novel black-box model for time series of prices analysis is proposed. It is constructed using the technique of “shaping filter”. The model identification is then propos...
H. Baili
IJCNN
2006
IEEE
15 years 7 months ago
Ensemble Techniques for Avoiding Poor Performance in Evolved Neural Networks
— The idea of using evolutionary techniques to optimize the performance of neural networks is now widely used, but some approaches have been found to result in the evolution of r...
John A. Bullinaria
ITRE
2006
IEEE
15 years 7 months ago
Image Inpainting via Fluid Equations
An inpainting technique for images and videos is introduced. The idea is to use fluid equations – the Navier-Stokes equations- as a PDE based method for the image processing. The...
Dalia Fishelov, Nir A. Sochen
WETICE
2006
IEEE
15 years 7 months ago
Authorisation Using Attributes from Multiple Authorities
This paper presents the results of a survey of requirements for attribute aggregation in authorisation systems, gathered from an international community of security professionals....
David W. Chadwick