Sciweavers

1356 search results - page 92 / 272
» The ideal of verified software
Sort
View
TCOM
2010
85views more  TCOM 2010»
14 years 6 months ago
Achieving the rate-distortion bound with low-density generator matrix codes
It is shown that binary low-density generator matrix codes can achieve the rate-distortion bound of discrete memoryless sources with general distortion measure via multilevel quant...
Zhibin Sun, Mingkai Shao, Jun Chen, Kon Max Wong, ...
FSTTCS
2009
Springer
15 years 6 months ago
Simulation based security in the applied pi calculus
We present a symbolic framework for refinement and composition of security protocols. ework uses the notion of ideal functionalities. These are abstract systems which are secure b...
Stéphanie Delaune, Steve Kremer, Olivier Pe...
IDEAL
2005
Springer
15 years 5 months ago
Patterns in Complex Systems Modeling
The design, development, and use of complex systems models raises a unique class of challenges and potential pitfalls, many of which are commonly recurring problems. Over time, res...
Janet Wiles, James Watson
TRUST
2010
Springer
15 years 5 months ago
A Pairing-Based DAA Scheme Further Reducing TPM Resources
Direct Anonymous Attestation (DAA) is an anonymous signature scheme designed for anonymous attestation of a Trusted Platform Module (TPM) while preserving the privacy of the devic...
Ernie Brickell, Jiangtao Li
CGI
1999
IEEE
15 years 4 months ago
Visualizing Knowledge about Virtual Reconstructions of Ancient Architecture
One of the assumptions of current software for visualizing architecture is that the underlying geometry is a correct, objective, and complete representation of the objects in ques...
Thomas Strothotte, Maic Masuch, Tobias Isenberg