Sciweavers

5525 search results - page 953 / 1105
» Verification of Model Transformations
Sort
View
CRYPTO
2010
Springer
189views Cryptology» more  CRYPTO 2010»
15 years 1 months ago
Instantiability of RSA-OAEP under Chosen-Plaintext Attack
We show that the widely deployed RSA-OAEP encryption scheme of Bellare and Rogaway (Eurocrypt 1994), which combines RSA with two rounds of an underlying Feistel network whose hash...
Eike Kiltz, Adam O'Neill, Adam Smith
ACCV
2010
Springer
14 years 11 months ago
Change Detection for Temporal Texture in the Fourier Domain
Abstract. Research on temporal textures has concerned mainly modeling, synthesis and detection, but not finding changes between different temporal textures. Shot change detection, ...
Alexia Briassouli, Ioannis Kompatsiaris
TII
2011
206views Education» more  TII 2011»
14 years 10 months ago
Timing-Failure Risk Assessment of UML Design Using Time Petri Net Bound Techniques
Abstract—Software systems that do not meet their timing constraints can cause risks. In this work, we propose a comprehensive method for assessing the risk of timing failure by e...
Simona Bernardi, Javier Campos, José Merseg...
TIP
2011
255views more  TIP 2011»
14 years 10 months ago
Dictionary Learning for Stereo Image Representation
—One of the major challenges in multi-view imaging is the definition of a representation that reveals the intrinsic geometry of the visual information. Sparse image representati...
Ivana Tosic, Pascal Frossard
MBEC
2010
122views Communications» more  MBEC 2010»
14 years 10 months ago
Real-time estimation of cerebrospinal fluid system parameters via oscillating pressure infusion
Abstract Hydrocephalus is related to a disturbed cerebrospinal fluid (CSF) system. For diagnosis, lumbar infusion test are performed to estimate outflow conductance, Cout, and pres...
Kennet Andersson, Ian R. Manchester, Jan Malm, And...