Sciweavers

7682 search results - page 1396 / 1537
» Active Appearance Models
Sort
View
CRYPTO
2003
Springer
96views Cryptology» more  CRYPTO 2003»
15 years 9 months ago
Scalable Protocols for Authenticated Group Key Exchange
We consider the fundamental problem of authenticated group key exchange among n parties within a larger and insecure public network. A number of solutions to this problem have bee...
Jonathan Katz, Moti Yung
ECAL
2003
Springer
15 years 9 months ago
Pattern Recognition in a Bucket
This paper demonstrates that the waves produced on the surface of water can be used as the medium for a “Liquid State Machine” that pre-processes inputs so allowing a simple pe...
Chrisantha Fernando, Sampsa Sojakka
FM
2003
Springer
146views Formal Methods» more  FM 2003»
15 years 9 months ago
Interacting State Machines for Mobility
We present two instantiations of generic Interactive State Machines (ISMs) with mobility features which are useful for modeling and verifying dynamically changing mobile systems. I...
Thomas A. Kuhn, David von Oheimb
161
Voted
INDOCRYPT
2003
Springer
15 years 9 months ago
On Multiplicative Linear Secret Sharing Schemes
We consider both information-theoretic and cryptographic settings for Multi-Party Computation (MPC), based on the underlying linear secret sharing scheme. Our goal is to study the ...
Ventzislav Nikov, Svetla Nikova, Bart Preneel
DATE
2002
IEEE
144views Hardware» more  DATE 2002»
15 years 9 months ago
Design Automation for Deepsubmicron: Present and Future
Advancing technology drives design technology and thus design automation EDA. How to model interconnect, how to handle degradation of signal integrity and increasing power densi...
Ralph H. J. M. Otten, Raul Camposano, Patrick Groe...
« Prev « First page 1396 / 1537 Last » Next »