Sciweavers

886 search results - page 52 / 178
» Generalized Bezout Identity
Sort
View
PKC
2009
Springer
129views Cryptology» more  PKC 2009»
14 years 1 months ago
Zero-Knowledge Proofs with Witness Elimination
Abstract. Zero-knowledge proofs with witness elimination are protocols that enable a prover to demonstrate knowledge of a witness to the verifier that accepts the interaction prov...
Aggelos Kiayias, Hong-Sheng Zhou
ICIP
1994
IEEE
14 years 10 months ago
Construction of Self-Dual Morphological Operators and Modifications of the Median
The median operator is a nonlinear (morphological) image transformation which has become very popular because it can suppress noise while preserving the edges. It treats the foreg...
Henk J. A. M. Heijmans
WWW
2006
ACM
14 years 10 months ago
Safeguard against unicode attacks: generation and applications of UC-simlist
A severe potential security problem in utilization of Unicode in the Web is identified, which is resulted from the fact that there are many similar characters in the Unicode Chara...
Anthony Y. Fu, Wan Zhang, Xiaotie Deng, Liu Wenyin
CHI
2007
ACM
14 years 9 months ago
Taking CHI for a drive: interaction in the car
With the increasing number of cars on the road, longer commutes, and the proliferation of complex information and entertainment features, there is a greater need for careful inter...
David M. Krum, Dietrich Manstetten, Clifford Nass,...
ODBIS
2007
Springer
127views Database» more  ODBIS 2007»
14 years 3 months ago
On RDF/S Ontology Evolution
Abstract. The algorithms dealing with the incorporation of new knowledge in an ontology (ontology evolution) often share a rather standard process of dealing with changes. This pro...
George Konstantinidis, Giorgos Flouris, Grigoris A...