Sciweavers

688 search results - page 78 / 138
» The Flow Set with Partial Order
Sort
View
CSFW
2005
IEEE
15 years 3 months ago
Computational and Information-Theoretic Soundness and Completeness of Formal Encryption
We consider expansions of the Abadi-Rogaway logic of indistinguishability of formal cryptographic expressions. We expand the logic in order to cover cases when partial information...
Pedro Adão, Gergei Bana, Andre Scedrov
CCS
2006
ACM
15 years 1 months ago
Provably-secure time-bound hierarchical key assignment schemes
A time-bound hierarchical key assignment scheme is a method to assign time-dependent encryption keys to a set of classes in a partially ordered hierarchy, in such a way that each ...
Giuseppe Ateniese, Alfredo De Santis, Anna Lisa Fe...
DGCI
2008
Springer
14 years 11 months ago
A New Fuzzy Connectivity Class Application to Structural Recognition in Images
Fuzzy sets theory constitutes a poweful tool, that can lead to more robustness in problems such as image segmentation and recognition. This robustness results to some extent from t...
Olivier Nempont, Jamal Atif, Enrico Angelini, Isab...
ICONIP
2007
14 years 11 months ago
Classification of Documents Based on the Structure of Their DOM Trees
In this paper, we discuss kernels that can be applied for the classification of XML documents based on their DOM trees. DOM trees are ordered trees in which every node might be la...
Peter Geibel, Olga Pustylnikov, Alexander Mehler, ...
DAGSTUHL
2006
14 years 11 months ago
Reference Point Approaches and Objective Ranking
The paper presents a reflection on some of the basic assumptions and philosophy of reference point approaches, stressing their unique concentration on the sovereignty of the subje...
Andrzej P. Wierzbicki