Sciweavers

535 search results - page 80 / 107
» Checking Computations in Polylogarithmic Time
Sort
View
CSE
2009
IEEE
14 years 2 months ago
Security and Trust through Electronic Social Network-Based Interactions
—The success of a Public Key Infrastructure such as the Web of Trust (WoT) heavily depends on its ability to ensure that public keys are used by their legitimate owners, thereby ...
Patrik Bichsel, Samuel Müller, Franz-Stefan P...
ICSOC
2009
Springer
14 years 2 months ago
An Automatic Approach to Enable Replacement of Conversational Services
Abstract. In Service Oriented Architectures (SOAs) services invoked in a composition can be replaced by other services, which are possibly discovered and bound at runtime. Most of ...
Luca Cavallaro, Elisabetta Di Nitto, Matteo Pradel...
MIDDLEWARE
2009
Springer
14 years 2 months ago
Automatic Generation of Network Protocol Gateways
The emergence of networked devices in the home has made it possible to develop applications that control a variety of household functions. However, current devices communicate via ...
Yérom-David Bromberg, Laurent Réveil...
ISSAC
2007
Springer
105views Mathematics» more  ISSAC 2007»
14 years 1 months ago
Certification of the QR factor R and of lattice basis reducedness
Given a lattice basis of n vectors in Zn, we propose an algorithm using 12n3 + O(n2) floating point operations for checking whether the basis is LLL-reduced. If the basis is redu...
Gilles Villard
ICPR
2006
IEEE
14 years 1 months ago
Change detection using joint intensity histogram
In the present paper, a method for detecting changes between two images of the same scene taken at different times using their joint intensity histogram is proposed. First, the jo...
Yasuyo Kita