Sciweavers

1017 search results - page 45 / 204
» A General Model for Authenticated Data Structures
Sort
View
SP
1998
IEEE
116views Security Privacy» more  SP 1998»
14 years 29 days ago
Strand Spaces: Why is a Security Protocol Correct?
A strand is a sequence of events; it represents either the execution of legitimate party in a security protocol or else a sequence of actions by a penetrator. A strand space is a ...
F. Javier Thayer, Jonathan C. Herzog, Joshua D. Gu...
JACM
2010
120views more  JACM 2010»
13 years 3 months ago
The structure of inverses in schema mappings
A schema mapping is a specification that describes how data structured under one schema (the source schema) is to be transformed into data structured under a different schema (the...
Ronald Fagin, Alan Nash
WWW
2009
ACM
14 years 9 months ago
Network analysis of collaboration structure in Wikipedia
In this paper we give models and algorithms to describe and analyze the collaboration among authors of Wikipedia from a network analytical perspective. The edit network encodes wh...
Denise van Raaij, Jürgen Lerner, Patrick Keni...
CPM
1999
Springer
129views Combinatorics» more  CPM 1999»
14 years 1 months ago
On the Structure of Syntenic Distance
This paper examines some of the rich structure of the syntenic distance model of evolutionary distance, introduced by Ferretti et al. (1996). The syntenic distance between two gen...
David Liben-Nowell
ICPR
2004
IEEE
14 years 9 months ago
An Enhanced Appearance Model for Ultrasound Image Segmentation
Active Appearance Model (AAM) [1] had been popular on object segmentation for medical images. However, its performance is not good on Ultrasound (US) images. In this paper, we pro...
Feng Cen, Hung-Tat Tsui, Tze Kin Lau, Yifeng Jiang...