Sciweavers

716 search results - page 110 / 144
» Algorithmic Issues in Coding Theory
Sort
View
114
Voted
CCS
2007
ACM
15 years 8 months ago
Universally composable and forward-secure RFID authentication and authenticated key exchange
Recently, a universally composable framework for RFID authentication protocols providing availability, anonymity, and authenticity was proposed. In this paper we extend that frame...
Tri Van Le, Mike Burmester, Breno de Medeiros
123
Voted
ECUMN
2007
Springer
15 years 8 months ago
End-to-End Distance Computation in Grid Environment by NDS, the Network Distance Service
This article presents a novel method for computing distances between hosts in a computational Grid. Our method allows to represent the cost to achieve any operation involving some...
Julien Gossa, Jean-Marc Pierson
GECCO
2007
Springer
230views Optimization» more  GECCO 2007»
15 years 8 months ago
Activation energy-based simulation for self-assembly of multi-shape tiles
Building artificial systems using self-assembly is one of the main issues of artificial life [17]. Scientists are trying to understand this process either using experimental appro...
Mostafa Mostafa Hashim Ellabaan
ISW
2007
Springer
15 years 8 months ago
On the Concept of Software Obfuscation in Computer Security
Abstract. Program obfuscation is a semantic-preserving transformation aimed at bringing a program into such a form, which impedes the understanding of its algorithm and data struct...
Nikolay Kuzurin, Alexander Shokurov, Nikolay P. Va...
SIBGRAPI
2006
IEEE
15 years 8 months ago
Duality between the Watershed by Image Foresting Transform and the Fuzzy Connectedness Segmentation Approaches
This paper makes a rereading of two successful image segmentation approaches, the fuzzy connectedness (FC) and the watershed (WS) approaches, by analyzing both by means of the Ima...
Romaric Audigier, Roberto de Alencar Lotufo