Sciweavers

89222 search results - page 33 / 17845
» Which
Sort
View
101
Voted
SPW
1997
Springer
15 years 5 months ago
Protocol Interactions and the Chosen Protocol Attack
There are many cases in the literature in which reuse of the same key material for different functions can open up security holes. In this paper, we discuss such interactions betw...
John Kelsey, Bruce Schneier, David Wagner
85
Voted
CONCUR
1995
Springer
15 years 4 months ago
Fibrational Control Structures
We provide a category theoretic reformulation of control structures, which avoids explicit reference to names. The basis of the formulation is what we call a binding structure, wh...
Claudio Hermida, John Power
AAAI
2008
15 years 3 months ago
Nonmonotonic Modes of Inference
In this paper we investigate nonmonotonic `modes of inference'. Our approach uses modal (conditional) logic to establish a uniform framework in which to study nonmonotonic co...
Victor Jauregui
68
Voted
CCCG
2006
15 years 2 months ago
Local Overlaps In Special Unfoldings Of Convex Polyhedra
We define a notion of local overlaps in polyhedron unfoldings. We use this concept to construct convex polyhedra for which certain classes of edge unfoldings contain overlaps, the...
Brendan Lucier
129
Voted
ESANN
2006
15 years 2 months ago
A Gaussian process latent variable model formulation of canonical correlation analysis
Abstract. We investigate a nonparametric model with which to visualize the relationship between two datasets. We base our model on Gaussian Process Latent Variable Models (GPLVM)[1...
Gayle Leen, Colin Fyfe