Sciweavers

2119 search results - page 240 / 424
» Structure-Preserving Model Reduction
Sort
View
STACS
2007
Springer
15 years 9 months ago
On the Automatic Analysis of Recursive Security Protocols with XOR
Abstract. In many security protocols, such as group protocols, principals have to perform iterative or recursive computations. We call such protocols recursive protocols. Recently,...
Ralf Küsters, Tomasz Truderung
ICMCS
2006
IEEE
181views Multimedia» more  ICMCS 2006»
15 years 9 months ago
A Fast Downsizing Video Transcoder for H.264/AVC with Rate-Distortion Optimal Mode Decision
This paper focuses on the mode decision and motion selection problem when H.264/AVC video streams are transcoded in spatial resolution. A fast downsizing transcoding scheme is dev...
Huifeng Shen, Xiaoyan Sun, Feng Wu, Houqiang Li, S...
QEST
2006
IEEE
15 years 9 months ago
UPPAAL 4.0
— UPPAAL 4.0 is the result of over two and a half years of development and contains many new features, additions to the modeling language, performance improvements, enhancements ...
Gerd Behrmann, Alexandre David, Kim Guldstrand Lar...
LICS
2005
IEEE
15 years 8 months ago
Reactive Systems over Cospans
The theory of reactive systems, introduced by Leifer and Milner and previously extended by the authors, allows the derivation of well-behaved labelled transition systems (LTS) for...
Vladimiro Sassone, Pawel Sobocinski
EUROCRYPT
2004
Springer
15 years 8 months ago
Short Signatures Without Random Oracles
We describe a short signature scheme that is strongly existentially unforgeable under an adaptive chosen message attack in the standard security model. Our construction works in g...
Dan Boneh, Xavier Boyen