Sciweavers

544 search results - page 4 / 109
» What cannot be computed locally!
Sort
View
82
Voted
ISN
1998
Springer
15 years 4 months ago
See What You Sign: Secure Implementations of Digital Signatures
An expectation of a signature system is that a signatory cannot dispute a signature. Aiming at this, the following questions arise: Can documents in electronic commerce on the Inte...
Arnd Weber
IWCIA
2009
Springer
15 years 5 months ago
What Does Digital Straightness Tell about Digital Convexity?
Abstract. The paper studies local convexity properties of parts of digital boundaries. An online and linear-time algorithm is introduced for the decomposition of a digital boundary...
Tristan Roussillon, Laure Tougne, Isabelle Sivigno...
105
Voted
IWCMC
2006
ACM
15 years 6 months ago
What does using TCP as an evaluation tool reveal about MANET routing protocols?
Past research studying the operations of TCP over wireless/mobile ad hoc networks has shown that TCP cannot be adopted as-is for use in mobile ad hoc networks (MANET) to achieve r...
Sundaram Rajagopalan, Chien-Chung Shen
108
Voted
ECSA
2010
Springer
15 years 19 days ago
Formal approach to security metrics.: what does "more secure" mean for you?
Security metrics are the tools for providing correct and upto-date information about a state of security. This information is essential for managing security efficiently. Although...
Leanid Krautsevich, Fabio Martinelli, Artsiom Yaut...
103
Voted
ICCV
2007
IEEE
16 years 2 months ago
What, where and who? Classifying events by scene and object recognition
We propose a first attempt to classify events in static images by integrating scene and object categorizations. We define an event in a static image as a human activity taking pla...
Li-Jia Li, Fei-Fei Li 0002