Sciweavers

29046 search results - page 5700 / 5810
» Computable Models
Sort
View
FC
2007
Springer
158views Cryptology» more  FC 2007»
15 years 10 months ago
Hidden Identity-Based Signatures
This paper introduces Hidden Identity-based Signatures (Hidden-IBS), a type of digital signatures that provide mediated signer-anonymity on top of Shamir’s Identity-based signat...
Aggelos Kiayias, Hong-Sheng Zhou
CVPR
2009
IEEE
15 years 10 months ago
Recovering Specular Surfaces Using Curved Line Images
We present a new shape-from-distortion framework for recovering specular (reflective/refractive) surfaces. While most existing approaches rely on accurate correspondences between 2...
Yuanyuan Ding, Jingyi Yu, Peter Sturm
HM
2007
Springer
137views Optimization» more  HM 2007»
15 years 10 months ago
A Hybrid VNS for Connected Facility Location
The connected facility location (ConFL) problem generalizes the facility location problem and the Steiner tree problem in graphs. Given a graph G = (V, E), a set of customers D ⊆...
Ivana Ljubic
ICCS
2007
Springer
15 years 10 months ago
Characterizing Implications of Injective Partial Orders
Abstract. Previous work of the authors has studied a notion of implication between sets of sequences based on the conceptual structure of a Galois lattice, and also a way of repres...
José L. Balcázar, Gemma C. Garriga
ICSOC
2007
Springer
15 years 10 months ago
Pattern Based SOA Deployment
Abstract. A key function of a Service Oriented Architecture is the separation between business logic and the platform of its implementation and deployment. Much of the focus in SOA...
William Arnold, Tamar Eilam, Michael H. Kalantar, ...
« Prev « First page 5700 / 5810 Last » Next »