Sciweavers

2282 search results - page 400 / 457
» Active property checking
Sort
View
ESORICS
2007
Springer
14 years 4 months ago
Synthesizing Secure Protocols
Abstract. We propose a general transformation that maps a cryptographic protocol that is secure in an extremely weak sense (essentially in a model where no adversary is present) in...
Véronique Cortier, Bogdan Warinschi, Eugen ...
ICANN
2007
Springer
14 years 4 months ago
Neural Mechanisms for Mid-Level Optical Flow Pattern Detection
This paper describes a new model for extracting large-field optical flow patterns to generate distributed representations of neural activation to control complex visual tasks such ...
Stefan Ringbauer, Pierre Bayerl, Heiko Neumann
PAM
2007
Springer
14 years 4 months ago
Neuro-fuzzy Processing of Packet Dispersion Traces for Highly Variable Cross-Traffic Estimation
Cross-traffic data rate over the tight link of a path can be estimated using different active probing packet dispersion techniques. Many of these techniques send large amounts of p...
Marco A. Alzate, Néstor M. Peña, Mig...
PKC
2007
Springer
151views Cryptology» more  PKC 2007»
14 years 4 months ago
Cryptanalysis of HFE with Internal Perturbation
Abstract. Multivariate Cryptography has been an active line of research for almost twenty years. While most multivariate cryptosystems have been under attack, variations of the bas...
Vivien Dubois, Louis Granboulan, Jacques Stern
SCALESPACE
2007
Springer
14 years 4 months ago
The Variational Origin of Motion by Gaussian Curvature
A variational formulation of an image analysis problem has the nice feature that it is often easier to predict the eect of minimizing a certain energy functional than to interpret...
Niels Chr. Overgaard, Jan Erik Solem