Sciweavers

4350 search results - page 866 / 870
» Case studies for contract-based systems
Sort
View
JAR
2000
145views more  JAR 2000»
13 years 7 months ago
Logical Cryptanalysis as a SAT Problem
Cryptographic algorithms play a key role in computer security and the formal analysis of their robustness is of utmost importance. Yet, logic and automated reasoning tools are seld...
Fabio Massacci, Laura Marraro
JOC
2000
181views more  JOC 2000»
13 years 7 months ago
Security Arguments for Digital Signatures and Blind Signatures
Abstract. Since the appearance of public-key cryptography in the seminal DiffieHellman paper, many new schemes have been proposed and many have been broken. Thus, the simple fact t...
David Pointcheval, Jacques Stern
IJCV
2002
99views more  IJCV 2002»
13 years 7 months ago
Subjective Surfaces: A Geometric Model for Boundary Completion
We present a geometric model and a computational method for segmentation of images with missing boundaries. In many situations, the human visual system fills in missing gaps in ed...
Alessandro Sarti, Ravi Malladi, James A. Sethian
TSMC
2002
100views more  TSMC 2002»
13 years 7 months ago
A LP-RR principle-based admission control for a mobile network
Abstract--In mobile networks, the traffic fluctuation is unpredictable due to mobility and varying resource requirement of multimedia applications. Hence, it is essential to mainta...
B. P. Vijay Kumar, P. Venkataram
PERVASIVE
2008
Springer
13 years 7 months ago
Pressing the Flesh: Sensing Multiple Touch and Finger Pressure on Arbitrary Surfaces
Abstract. This paper identifies a new physical correlate of finger pressure that can be detected and measured visually in a wide variety of situations. When a human finger is press...
Joe Marshall, Tony P. Pridmore, Mike Pound, Steve ...