Sciweavers

3318 search results - page 192 / 664
» The Weak Instance Model
Sort
View
EUROCRYPT
2011
Springer
14 years 8 months ago
Concurrent Composition in the Bounded Quantum Storage Model
We define the BQS-UC model, a variant of the UC model, that deals with protocols in the bounded quantum storage model. We present a statistically secure commitment protocol in th...
Dominique Unruh
ICPR
2008
IEEE
16 years 5 months ago
Background modelling in demanding situations with confidence measure
Background subtraction is a popular technique in video surveillance. In order to use it, a background model must be built and updated according to light and scenario changes. We d...
Juan Alfonso Rosell Ortega, Gabriela Andreu Garc&i...
ICSEA
2009
IEEE
15 years 11 months ago
Rule-Based Service Modeling
— In the context of service-oriented computing, services provide the capabilities necessary to support the business, especially its processes. Within the service modeling process...
Michael Gebhart, Sebastian Abeck
138
Voted
ECOOP
2007
Springer
15 years 10 months ago
A Relational Model of Object Collaborations and Its Use in Reasoning About Relationships
Abstract. Understanding the collaborations that arise between the instances of classes in object-oriented programs is important for the analysis, optimization, or modification of ...
Stephanie Balzer, Thomas R. Gross, Patrick Eugster
125
Voted
PPSN
2004
Springer
15 years 10 months ago
The Ising Model: Simple Evolutionary Algorithms as Adaptation Schemes
The investigation of evolutionary algorithms as adaptation schemes has a long history starting with Holland (1975). The Ising model from physics leads to a variety of different pr...
Patrick Briest, Dimo Brockhoff, Bastian Degener, M...