Sciweavers

2642 search results - page 61 / 529
» The development of Chez Scheme
Sort
View
SP
2009
IEEE
114views Security Privacy» more  SP 2009»
15 years 7 months ago
Formally Certifying the Security of Digital Signature Schemes
We present two machine-checked proofs of the existential unforgeability under adaptive chosen-message attacks of the Full Domain Hash signature scheme. These proofs formalize the ...
Santiago Zanella Béguelin, Gilles Barthe, B...
115
Voted
VTC
2008
IEEE
127views Communications» more  VTC 2008»
15 years 7 months ago
On a Practical Distributed Source Coding Scheme for Wireless Sensor Networks
— We present a practical distributed source coding scheme for deployable wireless sensor networks. To the best of our knowledge it is the first-of-its-kind practical scheme impl...
Frank Oldewurtel, Marcin Foks, Petri Mähö...
ICC
2007
IEEE
107views Communications» more  ICC 2007»
15 years 7 months ago
Time-Hopping UWB Multiuser Detection Using Adaptive Multistage Matrix Wiener Filtering Schemes
— Adaptive reduced-rank (RR) multistage matrix Wiener filtering (MMWF) techniques, based on the minimum mean-square error (MMSE) criterion, are proposed for timehopping (TH) pul...
Chia-Chang Hu, Hsuan-Yu Lin, Tsung-Hsien Liu, Yong...
AVSS
2006
IEEE
15 years 6 months ago
Recognizing Facial Expressions in Videos Using a Facial Action Analysis-Synthesis Scheme
In this paper, we propose a novel approach for facial expression analysis and recognition. The proposed approach relies on tracked facial actions provided by an appearance-based 3...
Fadi Dornaika, Bogdan Raducanu
ISORC
2005
IEEE
15 years 6 months ago
A Provenance-Aware Weighted Fault Tolerance Scheme for Service-Based Applications
Service-orientation has been proposed as a way of facilitating the development and integration of increasingly complex and heterogeneous system components. However, there are many...
Paul Townend, Paul T. Groth, Jie Xu