Sciweavers

1024 search results - page 170 / 205
» Value complete, column complete, predicate complete
Sort
View
CSFW
2002
IEEE
15 years 10 months ago
Capturing Parallel Attacks within the Data Independence Framework
We carry forward the work described in our previous papers [3, 14, 12] on the application of data independence to the model checking of cryptographic protocols using CSP [13] and ...
Philippa J. Broadfoot, A. W. Roscoe
ICARCV
2002
IEEE
109views Robotics» more  ICARCV 2002»
15 years 10 months ago
Quantized wavelet features and support vector machines for on-road vehicle detection
The focus of this work is on the problem of feature selection and classification for on-road vehicle detection. In particular, we propose using quantized Haar wavelet features an...
Zehang Sun, George Bebis, Ronald Miller
ICPPW
2002
IEEE
15 years 10 months ago
Hebbian Algorithms for a Digital Library Recommendation System
generally meta-data, so that documents on any specific subject can be transparently retrieved. While quality control can in principle still rely on the traditional methods of peer-...
Francis Heylighen, Johan Bollen
CONCUR
1998
Springer
15 years 9 months ago
Algebraic Techniques for Timed Systems
Performance evaluation is a central issue in the design of complex real-time systems. In this work, we propose an extension of socalled "Max-Plus" algebraic techniques to...
Albert Benveniste, Claude Jard, Stephane Gaubert
FSE
1994
Springer
134views Cryptology» more  FSE 1994»
15 years 9 months ago
Cryptanalysis of McGuffin
This paper shows that the actual proposal for an unbalanced Feistel network by Schneier and Blaze is as vulnerable to differential cryptanalysis as the DES. 1 McGuffin Schneier and...
Vincent Rijmen, Bart Preneel