Sciweavers

371 search results - page 47 / 75
» Expanders In Group Algebras
Sort
View
STACS
2007
Springer
14 years 2 months ago
On the Automatic Analysis of Recursive Security Protocols with XOR
Abstract. In many security protocols, such as group protocols, principals have to perform iterative or recursive computations. We call such protocols recursive protocols. Recently,...
Ralf Küsters, Tomasz Truderung
IROS
2006
IEEE
103views Robotics» more  IROS 2006»
14 years 2 months ago
Homography-based Tracking for Central Catadioptric Cameras
— This paper presents a parametric approach for tracking piecewise planar scenes with central catadioptric cameras (including perspective cameras). We extend the standard notion ...
Christopher Mei, Selim Benhimane, Ezio Malis, Patr...
CSFW
2005
IEEE
14 years 2 months ago
Temporal Rank Functions for Forward Secrecy
A number of key establishment protocols claim the property of forward secrecy, where the compromise of a longterm key does not result in the compromise of previously computed sess...
Rob Delicata, Steve A. Schneider
ICRA
2005
IEEE
134views Robotics» more  ICRA 2005»
14 years 2 months ago
Towards Decentralization of Multi-robot Navigation Functions
—We present a navigation function through which a group of mobile agents can be coordinated to achieve a particular formation, both in terms of shape and orientation, while avoid...
Herbert G. Tanner, Amit Kumar
ER
2004
Springer
90views Database» more  ER 2004»
14 years 2 months ago
WUML: A Web Usage Manipulation Language for Querying Web Log Data
In this paper, we develop a novel Web Usage Manipulation Language (WUML) which is a declarative language for manipulating Web log data. We assume that a set of trails formed by use...
Qingzhao Tan, Yiping Ke, Wilfred Ng