Sciweavers

1286 search results - page 181 / 258
» A Practical Modelling Notation for Secure Distributed Comput...
Sort
View
CCS
2006
ACM
13 years 11 months ago
Design space and analysis of worm defense strategies
We give the first systematic investigation of the design space of worm defense system strategies. We accomplish this by g a taxonomy of defense strategies by abstracting away impl...
David Brumley, Li-Hao Liu, Pongsin Poosankam, Dawn...
CCS
2008
ACM
13 years 9 months ago
Reducing protocol analysis with XOR to the XOR-free case in the horn theory based approach
In the Horn theory based approach for cryptographic protocol analysis, cryptographic protocols and (Dolev-Yao) intruders are modeled by Horn theories and security analysis boils d...
Ralf Küsters, Tomasz Truderung
CVPR
2008
IEEE
14 years 9 months ago
Volumetric reconstruction from multi-energy single-view radiography
We address the volumetric reconstruction problem that takes as input a series of orthographic multi-energy x-ray images, producing as output a reconstructed model space consisting...
Sang N. Le, Mei Kay Lee, Shamima Banu, Anthony C. ...
DCC
2010
IEEE
14 years 2 months ago
A Flexible Multiple Description Coding Scheme Based on Rateless Codes
The multiple description coding of an independent and identically distributed Gaussian source over bit error channels is considered. A novel practical multiple description coding ...
Ozgun Y. Bursalioglu, Giuseppe Caire
STOC
1997
ACM
111views Algorithms» more  STOC 1997»
13 years 12 months ago
The Swendsen-Wang Process Does Not Always Mix Rapidly
The Swendsen-Wang process provides one possible dynamics for the Qstate Potts model in statistical physics. Computer simulations of this process are widely used to estimate the ex...
Vivek Gore, Mark Jerrum