Sciweavers

2165 search results - page 316 / 433
» cases 2005
Sort
View
COSIT
2005
Springer
185views GIS» more  COSIT 2005»
15 years 3 months ago
3D Topographic Data Modelling: Why Rigidity Is Preferable to Pragmatism
In this paper two concepts for modelling 3D topography are introduced. The first concept is a very pragmatic approach of 3D modelling, trying to model as much as possible in (less...
Friso Penninga
CPAIOR
2005
Springer
15 years 3 months ago
Computing Explanations for the Unary Resource Constraint
Integration of explanations into a CSP solver is a technique addressing difficult question “why my problem has no solution”. Moreover, explanations together with advanced searc...
Petr Vilím
CRYPTO
2005
Springer
127views Cryptology» more  CRYPTO 2005»
15 years 3 months ago
One-Way Secret-Key Agreement and Applications to Circuit Polarization and Immunization of Public-Key Encryption
Secret-key agreement between two parties Alice and Bob, connected by an insecure channel, can be realized in an informationtheoretic sense if the parties share many independent pai...
Thomas Holenstein, Renato Renner
CTRSA
2005
Springer
79views Cryptology» more  CTRSA 2005»
15 years 3 months ago
Malicious Cryptography: Kleptographic Aspects
Abstract. In the last few years we have concentrated our research efforts on new threats to the computing infrastructure that are the result of combining malicious software (malwar...
Adam Young, Moti Yung
CVBIA
2005
Springer
15 years 3 months ago
Active Contours Under Topology Control Genus Preserving Level Sets
We present a novel framework to exert topology control over a level set evolution. Level set methods offer several advantages over parametric active contours, in particular automat...
Florent Ségonne, Jean-Philippe Pons, W. Eri...