Sciweavers

930 search results - page 132 / 186
» A Universal Encryption Standard
Sort
View
CHARME
2005
Springer
122views Hardware» more  CHARME 2005»
14 years 3 months ago
Regular Vacuity
The application of model-checking tools to complex systems involves a nontrivial step of modelling the system by a finite-state model and a translation of the desired properties i...
Doron Bustan, Alon Flaisher, Orna Grumberg, Orna K...
DPD
2007
86views more  DPD 2007»
13 years 10 months ago
Semantics based customization of UBL document schemas
Abstract. Universal Business Language (UBL) is an OASIS initiative to develop common business document schemas to provide document interoperability in the eBusiness domain. Since t...
Yalin Yarimagan, Asuman Dogac
BMCBI
2004
161views more  BMCBI 2004»
13 years 10 months ago
Three-parameter lognormal distribution ubiquitously found in cDNA microarray data and its application to parametric data treatme
Background: To cancel experimental variations, microarray data must be normalized prior to analysis. Where an appropriate model for statistical data distribution is available, a p...
Tomokazu Konishi
CVPR
2003
IEEE
15 years 8 days ago
Learning epipolar geometry from image sequences
We wish to determine the epipolar geometry of a stereo camera pair from image measurements alone. This paper describes a solution to this problem which does not require a parametr...
Yonatan Wexler, Andrew W. Fitzgibbon, Andrew Zisse...
FSE
2011
Springer
289views Cryptology» more  FSE 2011»
13 years 1 months ago
On Cipher-Dependent Related-Key Attacks in the Ideal-Cipher Model
Abstract. Bellare and Kohno introduced a formal framework for the study of related-key attacks against blockciphers. They established sufficient conditions (output-unpredictabilit...
Martin R. Albrecht, Pooya Farshim, Kenny G. Paters...