Sciweavers

3318 search results - page 419 / 664
» The Weak Instance Model
Sort
View
FAC
2008
123views more  FAC 2008»
15 years 3 months ago
Interface synthesis and protocol conversion
Given deterministic interfaces P and Q, we investigate the problem of synthesising an interface R such that P composed with R refines Q. We show that a solution exists iff P and Q ...
Purandar Bhaduri, S. Ramesh
IBERAMIA
2010
Springer
15 years 2 months ago
A Visual Grammar for Face Detection
Several methods have been developed for face detection with certain success, however these tend to fail under difficult conditions such as partial occlusions and changes in orienta...
Augusto Meléndez, Luis Enrique Sucar, Eduar...
INFOCOM
2010
IEEE
15 years 2 months ago
Password Strength: An Empirical Analysis
—It is a well known fact that user-chosen passwords are somewhat predictable: by using tools such as dictionaries or probabilistic models, attackers and password recovery tools c...
Matteo Dell'Amico, Pietro Michiardi, Yves Roudier
SIAMSC
2010
144views more  SIAMSC 2010»
15 years 2 months ago
A Fully Implicit Domain Decomposition Algorithm for Shallow Water Equations on the Cubed-Sphere
Abstract. Popular approaches for solving the shallow water equations (SWE) for climate modeling are explicit and semi-implicit methods, both have certain constraints on the time st...
Chao Yang, Jianwen Cao, Xiao-Chuan Cai
ICICS
2010
Springer
15 years 2 months ago
Threshold Public-Key Encryption with Adaptive Security and Short Ciphertexts
Threshold public-key encryption (TPKE) allows a set of users to decrypt a ciphertext if a given threshold of authorized users cooperate. Existing TPKE schemes suffer from either lo...
Bo Qin, Qianhong Wu, Lei Zhang, Josep Domingo-Ferr...