Sciweavers

777 search results - page 101 / 156
» presence 2010
Sort
View
JCS
2010
121views more  JCS 2010»
14 years 11 months ago
Computational soundness of symbolic zero-knowledge proofs
raction of cryptographic operations by term algebras, called Dolev-Yao models, is essential in almost all tool-supported methods for proving security protocols. Recently significa...
Michael Backes, Dominique Unruh
JCSS
2010
111views more  JCSS 2010»
14 years 11 months ago
Reduction rules for reset/inhibitor nets
Abstract. Reset/inhibitor nets are Petri nets extended with reset arcs and inhibitor arcs. A reset arc allows a transition to remove all tokens from a certain place when the transi...
H. M. W. Verbeek, Moe Thandar Wynn, Wil M. P. van ...
JOCN
2010
176views more  JOCN 2010»
14 years 11 months ago
Perception of Face Parts and Face Configurations: An fMRI Study
■ fMRI studies have reported three regions in human ventral visual cortex that respond selectively to faces: the occipital face area (OFA), the fusiform face area (FFA), and a f...
Jia Liu, Alison Harris, Nancy Kanwisher
JPDC
2010
65views more  JPDC 2010»
14 years 11 months ago
Combining shared-coin algorithms
This paper shows that shared coin algorithms can be combined to optimize several complexity measures, even in the presence of a strong adversary. By combining shared coins of Brac...
James Aspnes, Hagit Attiya, Keren Censor
LICS
2010
IEEE
14 years 11 months ago
Weak Equivalences in Psi-Calculi
Psi-calculi extend the pi-calculus with nominal datatypes to represent data, communication channels, and logics for facts and conditions. This general framework admits highly expr...
Magnus Johansson, Jesper Bengtson, Joachim Parrow,...