Sciweavers

3318 search results - page 499 / 664
» The Weak Instance Model
Sort
View
EUROCRYPT
2005
Springer
15 years 6 months ago
Universally Composable Password-Based Key Exchange
Abstract. We propose and realize a definition of security for passwordbased key exchange within the framework of universally composable (UC) security, thus providing security guar...
Ran Canetti, Shai Halevi, Jonathan Katz, Yehuda Li...
108
Voted
ICALP
2005
Springer
15 years 6 months ago
Spatial Logics for Bigraphs
Bigraphs are emerging as a (meta-)model for concurrent calculi, like CCS, ambients, πcalculus, and Petri nets. They are built orthogonally on two structures: a hierarchical place...
Giovanni Conforti, Damiano Macedonio, Vladimiro Sa...
SCIA
2005
Springer
15 years 6 months ago
Optimal Estimation of Homogeneous Vectors
Estimation of inhomogeneous vectors is well-studied in estimation theory. For instance, given covariance matrices of input data allow to compute optimal estimates and characterize...
Matthias Mühlich, Rudolf Mester
ECCV
2004
Springer
15 years 6 months ago
Multi-model Component-Based Tracking Using Robust Information Fusion
Abstract. One of the most difficult aspects of visual object tracking is the handling of occlusions and target appearance changes due to variations in illumination and viewing dir...
Bogdan Georgescu, Dorin Comaniciu, Tony X. Han, Xi...
100
Voted
ESOP
2004
Springer
15 years 6 months ago
Canonical Graph Shapes
Abstract. Graphs are an intuitive model for states of a (software) system that include pointer structures — for instance, object-oriented programs. However, a naive encoding resu...
Arend Rensink