Sciweavers

1628 search results - page 247 / 326
» Compiler Construction Using Scheme
Sort
View
IJACT
2008
136views more  IJACT 2008»
13 years 10 months ago
Anonymous RFID authentication supporting constant-cost key-lookup against active adversaries
: In the absence of sufficiently optimised public key constructions, anonymous authentication for Radio-Frequency Identification Devices (RFIDs) requires state synchronisation betw...
Mike Burmester, Breno de Medeiros, Rossana Motta
JANCL
2006
105views more  JANCL 2006»
13 years 10 months ago
BDD-based decision procedures for the modal logic K
We describe BDD-based decision procedures for the modal logic K. Our approach is inspired by the automata-theoretic approach, but we avoid explicit automata construction. Instead, ...
Guoqiang Pan, Ulrike Sattler, Moshe Y. Vardi
TIT
2008
74views more  TIT 2008»
13 years 10 months ago
Optimal Parsing Trees for Run-Length Coding of Biased Data
Abstract-- We study coding schemes which encode unconstrained sequences into run-length-limited (d, k)-constrained sequences. We present a general framework for the construction of...
Sharon Aviran, Paul H. Siegel, Jack K. Wolf
PAMI
2007
186views more  PAMI 2007»
13 years 9 months ago
The Medial Scaffold of 3D Unorganized Point Clouds
—We introduce the notion of the medial scaffold, a hierarchical organization of the medial axis of a 3D shape in the form of a graph constructed from special medial curves connec...
Frederic F. Leymarie, Benjamin B. Kimia
SETA
2010
Springer
173views Mathematics» more  SETA 2010»
13 years 8 months ago
User-Irrepressible Sequences
Protocol sequences are binary and periodic sequences used in multiple-access scheme for collision channel without feedback. Each user reads out the bits from the assigned protocol ...
Kenneth W. Shum, Yijin Zhang, Wing Shing Wong