Sciweavers

8196 search results - page 1531 / 1640
» Computational Modeling and Complexity Science
Sort
View
ECCC
2007
123views more  ECCC 2007»
13 years 10 months ago
Lossy Trapdoor Functions and Their Applications
We propose a general cryptographic primitive called lossy trapdoor functions (lossy TDFs), and use it to develop new approaches for constructing several important cryptographic to...
Chris Peikert, Brent Waters
KES
2006
Springer
13 years 10 months ago
Intelligent Environment for Training of Power Systems Operators
Training of operators has become an important problem to be faced by power systems: updating knowledge and skills. An operator must comprehend the physical operation of the process...
Gustavo Arroyo-Figueroa, Yasmín Herná...
PRL
2008
246views more  PRL 2008»
13 years 10 months ago
Automatic medical image annotation in ImageCLEF 2007: Overview, results, and discussion
In this paper, the automatic medical annotation task of the 2007 CLEF cross-language image retrieval campaign (ImageCLEF) is described. The paper focusses on the images used, the ...
Thomas Deselaers, Thomas Martin Deserno, Henning M...
SIAMIS
2008
279views more  SIAMIS 2008»
13 years 10 months ago
A New Alternating Minimization Algorithm for Total Variation Image Reconstruction
We propose, analyze and test an alternating minimization algorithm for recovering images from blurry and noisy observations with total variation (TV) regularization. This algorith...
Yilun Wang, Junfeng Yang, Wotao Yin, Yin Zhang
TDSC
2008
152views more  TDSC 2008»
13 years 10 months ago
Towards Formal Verification of Role-Based Access Control Policies
Specifying and managing access control policies is a challenging problem. We propose to develop formal verification techniques for access control policies to improve the current s...
Somesh Jha, Ninghui Li, Mahesh V. Tripunitara, Qih...
« Prev « First page 1531 / 1640 Last » Next »