Sciweavers

1089 search results - page 117 / 218
» Bounds on generalized Frobenius numbers
Sort
View
CCS
2005
ACM
14 years 2 months ago
Deciding security of protocols against off-line guessing attacks
We provide an effective procedure for deciding the existence of off-line guessing attacks on security protocols, for a bounded number of sessions. The procedure consists of a co...
Mathieu Baudet
ICALP
2005
Springer
14 years 2 months ago
Combining Intruder Theories
Abstract. Most of the decision procedures for symbolic analysis of protocols are limited to a fixed set of algebraic operators associated with a fixed intruder theory. Examples o...
Yannick Chevalier, Michaël Rusinowitch
WCC
2005
Springer
140views Cryptology» more  WCC 2005»
14 years 2 months ago
Constructions of Complementary Sequences for Power-Controlled OFDM Transmission
We present constructions of polyphase sequences suitable for the use as codewords in orthogonal frequency-division multiplexing (OFDM) with strictly bounded peak-to-mean envelope p...
Kai-Uwe Schmidt, Adolf Finger
MM
2003
ACM
80views Multimedia» more  MM 2003»
14 years 2 months ago
Position calibration of audio sensors and actuators in a distributed computing platform
In this paper, we present a novel approach to automatically determine the positions of sensors and actuators in an ad-hoc distributed network of heterogeneous general purpose comp...
Vikas C. Raykar, Igor Kozintsev, Rainer Lienhart
RT
2001
Springer
14 years 1 months ago
Real-Time Occlusion Culling with a Lazy Occlusion Grid
We present a new conservative image-based occlusion culling method to increase the speed of hardware accelerated rendering of very complex general scenes which may consist of mill...
Heinrich Hey, Robert F. Tobler, Werner Purgathofer