Sciweavers

1818 search results - page 232 / 364
» Granularity-Adaptive Proof Presentation
Sort
View
TCOS
2010
14 years 10 months ago
J-PAKE: Authenticated Key Exchange without PKI
Password Authenticated Key Exchange (PAKE) is one of the important topics in cryptography. It aims to address a practical security problem: how to establish secure communication be...
Feng Hao, Peter Ryan
TNN
2010
154views Management» more  TNN 2010»
14 years 10 months ago
Discriminative semi-supervised feature selection via manifold regularization
We consider the problem of semi-supervised feature selection, where we are given a small amount of labeled examples and a large amount of unlabeled examples. Since a small number ...
Zenglin Xu, Irwin King, Michael R. Lyu, Rong Jin
156
Voted
TNN
2010
233views Management» more  TNN 2010»
14 years 10 months ago
A hierarchical RBF online learning algorithm for real-time 3-D scanner
In this paper, a novel real-time online network model is presented. It is derived from the hierarchical radial basis function (HRBF) model and it grows by automatically adding unit...
Stefano Ferrari, Francesco Bellocchio, Vincenzo Pi...
IACR
2011
137views more  IACR 2011»
14 years 3 months ago
Lightweight Anonymous Authentication with TLS and DAA for Embedded Mobile Devices
Although anonymous authentication has been extensively studied, so far no scheme has been widely adopted in practice. A particular issue with fully anonymous authentication schemes...
Liqun Chen, Kurt Dietrich, Hans Löhr, Ahmad-R...
POPL
2012
ACM
13 years 11 months ago
Syntactic control of interference for separation logic
Separation Logic has witnessed tremendous success in recent years in reasoning about programs that deal with heap storage. Its success owes to the fundamental principle that one s...
Uday S. Reddy, John C. Reynolds