Sciweavers

1628 search results - page 52 / 326
» Compiler Construction Using Scheme
Sort
View
ICCV
2001
IEEE
15 years 3 hour ago
Robust Histogram Construction from Color Invariants
An effective object recognition scheme is to represent and match images on the basis of histograms derived from photometric color invariants. A drawback, however, is that certain c...
Theo Gevers
CORR
2008
Springer
90views Education» more  CORR 2008»
13 years 10 months ago
A computationally-efficient construction for the matrix-based key distribution in sensor network
Key pre-distribution in wireless sensor network is aimed at delivering keys to sensor networks at the low expense of computation, communication, and memory while providing a high d...
Abedelaziz Mohaisen
ASIACRYPT
2009
Springer
14 years 4 months ago
Fiat-Shamir with Aborts: Applications to Lattice and Factoring-Based Signatures
We demonstrate how the framework that is used for creating efficient number-theoretic ID and signature schemes can be transferred into the setting of lattices. This results in cons...
Vadim Lyubashevsky
APLAS
2006
ACM
14 years 4 months ago
Scheme with Classes, Mixins, and Traits
Abstract. The Scheme language report advocates language design as the composition of a small set of orthogonal constructs, instead of a large accumulation of features. In this pape...
Matthew Flatt, Robert Bruce Findler, Matthias Fell...
PKC
2005
Springer
125views Cryptology» more  PKC 2005»
14 years 3 months ago
A Generic Scheme Based on Trapdoor One-Way Permutations with Signatures as Short as Possible
We answer the open question of the possibility of building a digital signature scheme with proven security based on the one-wayness of a trapdoor permutation and with signatures as...
Louis Granboulan