Sciweavers

308 search results - page 53 / 62
» A New Model for Public-Key Authentication
Sort
View
130
Voted
DRM
2008
Springer
15 years 5 months ago
RSA-TBOS signcryption with proxy re-encryption
The recent attack on Apple iTunes Digital Rights Management [17] has brought to light the usefulness of proxy re-encryption schemes for Digital Rights Management. It is known that...
Varad Kirtane, C. Pandu Rangan
116
Voted
INFFUS
2011
82views more  INFFUS 2011»
14 years 7 months ago
Joint ego-motion and road geometry estimation
We provide a sensor fusion framework for solving the problem of joint ego-motion and road geometry estimation. More specifically we employ a sensor fusion framework to make syste...
Christian Lundquist, Thomas B. Schön
131
Voted
IJFCS
2006
110views more  IJFCS 2006»
15 years 3 months ago
Sat-based Model Checking for Region Automata
For successful software verification, model checkers must be capable of handling a large number of program variables. Traditional, BDD-based model checking is deficient in this re...
Fang Yu, Bow-Yaw Wang
190
Voted
BDIM
2008
IEEE
205views Business» more  BDIM 2008»
15 years 10 months ago
Mining semantic relations using NetFlow
—Knowing the dependencies among computing assets and services provides insights into the computing and business landscape, therefore, facilitating low-risk timely changes in supp...
Alexandru Caracas, Andreas Kind, Dieter Gantenbein...
QOFIS
2004
Springer
15 years 9 months ago
BarterRoam: A Novel Mobile and Wireless Roaming Settlement Model
This paper describes BarterRoam: a new novel mobile and wireless roaming settlement model and clearance methodology, based on the concept of sharing and bartering excess capacities...
Eng Keong Lua, Alex Lin, Jon Crowcroft, Valerie Ta...