Sciweavers

893 search results - page 17 / 179
» Descent Theory for Schemes
Sort
View
WEWORC
2007
132views Cryptology» more  WEWORC 2007»
14 years 3 hour ago
Towards a Concrete Security Proof of Courtois, Finiasz and Sendrier Signature Scheme
Abstract. Courtois, Finiasz and Sendrier proposed in 2001 a practical code-based signature scheme. We give a rigorous security analysis of a modified version of this scheme in the...
Léonard Dallot
TC
2008
13 years 10 months ago
A More Realistic Thinning Scheme for Call Admission Control in Multimedia Wireless Networks
A call admission control scheme named thinning scheme, which smoothly throttles the admission rates of calls according to their priorities and aims to provide multiple prioritized ...
Xian Wang, Pingzhi Fan, Yi Pan
SASN
2004
ACM
14 years 4 months ago
Revisiting random key pre-distribution schemes for wireless sensor networks
Key management is one of the fundamental building blocks of security services. In a network with resource constrained nodes like sensor networks, traditional key management techni...
Joengmin Hwang, Yongdae Kim
DICTA
2007
14 years 9 days ago
The Tower of Knowledge Scheme for Learning in Computer Vision
A scheme, named tower of knowledge (ToK), is proposed for interpreting 3D scenes. The ToK encapsulates causal dependencies between object appearance and functionality. We demonstr...
Maria Petrou, Mai Xu
CAV
2009
Springer
181views Hardware» more  CAV 2009»
14 years 11 months ago
Size-Change Termination, Monotonicity Constraints and Ranking Functions
Abstract. Size-change termination involves deducing program termination based on the impossibility of infinite descent. To this end we may use m abstraction in which transitions ar...
Amir M. Ben-Amram