Sciweavers

893 search results - page 17 / 179
» Descent Theory for Schemes
Sort
View
83
Voted
WEWORC
2007
132views Cryptology» more  WEWORC 2007»
15 years 1 months ago
Towards a Concrete Security Proof of Courtois, Finiasz and Sendrier Signature Scheme
Abstract. Courtois, Finiasz and Sendrier proposed in 2001 a practical code-based signature scheme. We give a rigorous security analysis of a modified version of this scheme in the...
Léonard Dallot
100
Voted
TC
2008
15 years 18 days ago
A More Realistic Thinning Scheme for Call Admission Control in Multimedia Wireless Networks
A call admission control scheme named thinning scheme, which smoothly throttles the admission rates of calls according to their priorities and aims to provide multiple prioritized ...
Xian Wang, Pingzhi Fan, Yi Pan
126
Voted
SASN
2004
ACM
15 years 6 months ago
Revisiting random key pre-distribution schemes for wireless sensor networks
Key management is one of the fundamental building blocks of security services. In a network with resource constrained nodes like sensor networks, traditional key management techni...
Joengmin Hwang, Yongdae Kim
90
Voted
DICTA
2007
15 years 2 months ago
The Tower of Knowledge Scheme for Learning in Computer Vision
A scheme, named tower of knowledge (ToK), is proposed for interpreting 3D scenes. The ToK encapsulates causal dependencies between object appearance and functionality. We demonstr...
Maria Petrou, Mai Xu
83
Voted
CAV
2009
Springer
181views Hardware» more  CAV 2009»
16 years 1 months ago
Size-Change Termination, Monotonicity Constraints and Ranking Functions
Abstract. Size-change termination involves deducing program termination based on the impossibility of infinite descent. To this end we may use m abstraction in which transitions ar...
Amir M. Ben-Amram