Sciweavers

2028 search results - page 366 / 406
» Deriving Relation Keys from XML Keys
Sort
View
TCC
2005
Springer
113views Cryptology» more  TCC 2005»
15 years 9 months ago
Entropic Security and the Encryption of High Entropy Messages
Russell and Wang [22] recently introduced an elegant, information-theoretic notion called entropic security of encryption: they required that the cipher text leak no predicate of ...
Yevgeniy Dodis, Adam Smith
IUI
2004
ACM
15 years 9 months ago
An intelligent assistant for interactive workflow composition
Complex applications in many areas, including scientific computations and business-related web services, are created from collections of components to form workflows. In many case...
Jihie Kim, Marc Spraragen, Yolanda Gil
154
Voted
ECCV
2010
Springer
15 years 9 months ago
Detecting ground shadows in outdoor consumer photographs
Detecting shadows from images can significantly improve the performance of several vision tasks such as object detection and tracking. Recent approaches have mainly used illuminat...
DIAGRAMS
2008
Springer
15 years 5 months ago
Diagrams in the UK National School Curriculum
Abstract. We review the use of diagrams in the UK National School Curriculum (NC) and assess it in the light of current research on childrens' graph comprehension. It is noted...
Grecia Garcia Garcia, Richard Cox
AAAI
1994
15 years 5 months ago
Solution Reuse in Dynamic Constraint Satisfaction Problems
Many AI problems can be modeled as constraint satisfaction problems (CSP), but many of them are actually dynamic: the set of constraints to consider evolves because of the environ...
Gérard Verfaillie, Thomas Schiex