Sciweavers

2913 search results - page 269 / 583
» How Much to Copy
Sort
View
ASIACRYPT
2001
Springer
15 years 7 months ago
Efficient and Mutually Authenticated Key Exchange for Low Power Computing Devices
Abstract. In this paper, we consider the problem of mutually authenticated key exchanges between a low-power client and a powerful server. We show how the Jakobsson-Pointcheval sch...
Duncan S. Wong, Agnes Hui Chan
IPPS
1998
IEEE
15 years 7 months ago
Protocols for Non-Deterministic Communication over Synchronous Channels
In this paper, we propose several deadlock-free protocols for implementing the generalized alternative construct, where a process non-deterministically chooses between sending or ...
Erik D. Demaine
SAS
2000
Springer
15 years 7 months ago
Tree Schemata and Fair Termination
We present a new representation for possibly infinite sets of possibly infinite trees. This representation makes extensive use of sharing to achieve efficiency. As much as possible...
Laurent Mauborgne
IPAS
2007
15 years 6 months ago
Multilevel surround inhibition: a biologically inspired contour detector
Canny edge detector is based both on local and global image analysis, present in the gradient computation and connectivity-related hysteresis thresholding, respectively. This cont...
Giuseppe Papari, Patrizio Campisi, Nicolai Petkov
DLS
2005
148views Languages» more  DLS 2005»
15 years 6 months ago
Compile-time meta-programming in a dynamically typed OO language
Compile-time meta-programming allows programs to be constructed by the user at compile-time. Although LISP derived languages have long had such facilities, few modern languages ar...
Laurence Tratt