Abstract—An interactive retrieval method adapted to surveillance video is presented. The approach is formulated as an iterative SVM classification and builds upon the two major ...
Abstract. A protocol compiler is described, that transforms any provably secure authenticated 2-party key establishment into a provably secure authenticated group key establishment...
Michel Abdalla, Jens-Matthias Bohli, Maria Isabel ...
Abstract. Recent developments in computer and communication networks require scheduling decisions to be made under increasingly complex system dynamics. We model and analyze the pr...
Abstract. We present a universally composable time-stamping scheme based on universal one-way hash functions. The model we use contains an ideal auditing functionality (implementab...
Abstract. Previously it has been shown that the process of programming a cardiac pacemaker can be described in terms of the theory of diagnosis. A set-theoretical framework of diag...