Sciweavers

247 search results - page 25 / 50
» ccs 2007
Sort
View
SGP
2007
15 years 1 days ago
Fast normal vector compression with bounded error
We present two methods for lossy compression of normal vectors through quantization using "base" polyhedra. The first revisits subdivision-based quantization. The second...
Eric J. Griffith, Michal Koutek, Frits H. Post
VISSYM
2007
15 years 1 days ago
Segmentation of DT-MRI Anisotropy Isosurfaces
While isosurfaces of anisotropy measures for data from diffusion tensor magnetic resonance imaging (DT-MRI) are known to depict major anatomical structures, the anisotropy metric ...
Thomas Schultz, Holger Theisel, Hans-Peter Seidel
AICT
2007
IEEE
122views Communications» more  AICT 2007»
14 years 11 months ago
Towards Security Analyses of an Identity Federation Protocol for Web Services in Convergent Networks
— We describe a formal approach to the analysis of security aspects of an identity federation protocol for web services in convergent networks. This network protocol was proposed...
Maurice H. ter Beek, Corrado Moiso, Marinella Petr...
FAC
2007
90views more  FAC 2007»
14 years 9 months ago
Responsiveness and stable revivals
Individual components in an inter-operating system require assurance from other components both of appropriate functionality and of suitable responsiveness. We have developed prope...
Joy N. Reed, A. W. Roscoe, J. E. Sinclair
97
Voted
CCS
2007
ACM
15 years 3 months ago
Robust group key agreement using short broadcasts
A group key agreement protocol (GKA) allows a set of players to establish a shared secret key which can be used to secure a subsequent communication. Several efficient constantrou...
Stanislaw Jarecki, Jihye Kim, Gene Tsudik