Sciweavers

1497 search results - page 133 / 300
» A Computational Model for Message Passing
Sort
View
ICALP
2005
Springer
14 years 1 months ago
Password-Based Encryption Analyzed
Abstract. The use of passwords in security protocols is particularly delicate because of the possibility of off-line guessing attacks. We study password-based protocols in the cont...
Martín Abadi, Bogdan Warinschi
BROADNETS
2006
IEEE
14 years 2 months ago
Performance Analysis of Soft-State Lightpath Management in GMPLS-Based WDM Networks
RSVP–TE is a signaling protocol to setup and teardown lightpaths in wavelength–routed GPMLS networks. RSVP– TE uses the soft–state control mechanism to manage lightpaths. ...
Shinya Ishida, Shin'ichi Arakawa, Masayuki Murata
CVPR
2005
IEEE
14 years 10 months ago
A Hybrid Graphical Model for Robust Feature Extraction from Video
We consider a visual scene analysis scenario where objects (e.g. people, cars) pass through the viewing field of a static camera and need to be detected and segmented from the bac...
Ali Taylan Cemgil, Wojciech Zajdel, Ben J. A. Kr&o...
PG
1998
IEEE
14 years 17 days ago
Modeling of Clouds from Satellite Images using Metaballs
This paper proposes an image-based modeling of clouds where realistic clouds are created from satellite images using metaballs. The intention of the paper is for applications to s...
Yoshinori Dobashi, Tomoyuki Nishita, Hideo Yamashi...
DAC
2006
ACM
14 years 9 months ago
Automatic invariant strengthening to prove properties in bounded model checking
In this paper, we present a method that helps improve the performance of Bounded Model Checking by automatically strengthening invariants so that the termination proof may be obta...
Mohammad Awedh, Fabio Somenzi