Sciweavers

5255 search results - page 977 / 1051
» Formal Methods for Privacy
Sort
View
JOC
2011
104views more  JOC 2011»
12 years 12 months ago
On the Security of Oscillator-Based Random Number Generators
Physical random number generators (a.k.a. TRNGs) appear to be critical components of many cryptographic systems. Yet, such building blocks are still too seldom provided with a form...
Mathieu Baudet, David Lubicz, Julien Micolod, Andr...
SIAMAM
2011
12 years 12 months ago
On the Optimal Receiver Activation Function for Distance-Based Geographic Transmissions
In wireless networks, the channels are often subject to random variations that limit the reliability of communications between any two radios. Geographic transmission strategies ca...
Murali Rao, Tathagata D. Goswami, Joseph Glover, J...
SIAMAM
2011
12 years 12 months ago
Kinetics of Swelling Gels
We develop a general theory of the swelling kinetics of polymer gels, with the view that a polymer gel is a two-phase fluid. The model we propose is a free boundary problem and ca...
James P. Keener, Sarthok Sircar, Aaron L. Fogelson
CADE
2011
Springer
12 years 9 months ago
Deciding Security for Protocols with Recursive Tests
Abstract. Security protocols aim at securing communications over public networks. Their design is notoriously difficult and error-prone. Formal methods have shown their usefulness ...
Mathilde Arnaud, Véronique Cortier, St&eacu...
CAIP
2011
Springer
248views Image Analysis» more  CAIP 2011»
12 years 9 months ago
Statistical Tuning of Adaptive-Weight Depth Map Algorithm
Abstract. In depth map generation, the settings of the algorithm parameters to yield an accurate disparity estimation are usually chosen empirically or based on unplanned experimen...
Alejandro Hoyos, John Congote, Iñigo Barand...