Sciweavers

1634 search results - page 101 / 327
» Classifying Technical Terms
Sort
View
FSE
2004
Springer
150views Cryptology» more  FSE 2004»
14 years 2 months ago
Ciphers Secure against Related-Key Attacks
Abstract. In a related-key attack, the adversary is allowed to transform the secret key and request encryptions of plaintexts under the transformed key. This paper studies the secu...
Stefan Lucks
ICAISC
2004
Springer
14 years 2 months ago
One Day Prediction of NIKKEI Index Considering Information from Other Stock Markets
A task of a stock index prediction is presented in this paper. Several issues are considered. The data is gathered at the concerned stock market (NIKKEI) and two other markets (NAS...
Marcin Jaruszewicz, Jacek Mandziuk
IWCM
2004
Springer
14 years 2 months ago
Towards a Multi-camera Generalization of Brightness Constancy
Standard optical flow methods for motion or disparity estimation use a brightness constancy constraint equation (BCCE). This BCCE either handles a moving camera imaging a non-movi...
Hanno Scharr
PADL
2004
Springer
14 years 2 months ago
An Algebraic Theory of Polymorphic Temporal Media
Temporal media is information that is directly consumed by a user, and that varies with time. Examples include music, digital sound files, computer animations, and video clips. I...
Paul Hudak
ACMICEC
2003
ACM
130views ECommerce» more  ACMICEC 2003»
14 years 2 months ago
A business-to-business interoperability testbed: an overview
In this paper, we describe a business-to-business (B2B) testbed co-sponsored by the Open Applications Group, Inc. (OAGI) and the National Institute of Standard and Technology (NIS...
Boonserm Kulvatunyou, Nenad Ivezic, Monica Martin,...