Sciweavers

209 search results - page 10 / 42
» ideal 2009
Sort
View
FSTTCS
2009
Springer
15 years 4 months ago
Simulation based security in the applied pi calculus
We present a symbolic framework for refinement and composition of security protocols. ework uses the notion of ideal functionalities. These are abstract systems which are secure b...
Stéphanie Delaune, Steve Kremer, Olivier Pe...
IMA
2009
Springer
152views Cryptology» more  IMA 2009»
15 years 4 months ago
Codes as Modules over Skew Polynomial Rings
In previous works we considered codes defined as ideals of quotients of skew polynomial rings, so called Ore rings of automorphism type. In this paper we consider codes defined a...
Delphine Boucher, Felix Ulmer
94
Voted
ACCV
2009
Springer
14 years 10 months ago
Person De-identification in Videos
Advances in cameras and web technology have made it easy to capture and share large amounts of video data over to a large number of people. A large number of cameras oversee public...
Prachi Agrawal, P. J. Narayanan
MICRO
2009
IEEE
120views Hardware» more  MICRO 2009»
15 years 4 months ago
Tribeca: design for PVT variations with local recovery and fine-grained adaptation
With continued advances in CMOS technology, parameter variations are emerging as a major design challenge. Irregularities during the fabrication of a microprocessor and variations...
Meeta Sharma Gupta, Jude A. Rivers, Pradip Bose, G...
CDC
2009
IEEE
137views Control Systems» more  CDC 2009»
15 years 2 months ago
Discretization of Linear Fractional Representations of LPV systems
Abstract— Commonly, controllers for Linear ParameterVarying (LPV) systems are designed in continuous-time using a Linear Fractional Representation (LFR) of the plant. However, th...
Roland Tóth, Marco Lovera, Peter S. C. Heub...