Sciweavers

380 search results - page 57 / 76
» Instance Matching with COMA
Sort
View
LPAR
2007
Springer
14 years 1 months ago
Verifying Cryptographic Protocols with Subterms Constraints
Many analysis techniques and decidability results have been obtained for cryptographic protocols. However all of them consider protocols with limited procedures for the processing ...
Yannick Chevalier, Denis Lugiez, Michaël Rusi...
CVPR
2006
IEEE
14 years 1 months ago
Depth from Familiar Objects: A Hierarchical Model for 3D Scenes
We develop an integrated, probabilistic model for the appearance and three-dimensional geometry of cluttered scenes. Object categories are modeled via distributions over the 3D lo...
Erik B. Sudderth, Antonio B. Torralba, William T. ...
STOC
2006
ACM
112views Algorithms» more  STOC 2006»
14 years 1 months ago
Limitations of quantum coset states for graph isomorphism
It has been known for some time that graph isomorphism reduces to the hidden subgroup problem (HSP). What is more, most exponential speedups in quantum computation are obtained by...
Sean Hallgren, Cristopher Moore, Martin Rötte...
CCGRID
2005
IEEE
14 years 1 months ago
Semantic integration of file-based data for grid services
Data services for the Grid have focussed so far primarily on virtualising access to distributed databases, and encapsulating file location. However, orchestration of services requ...
Andrew Woolf, Ray Cramer, Marta Gutierrez, Kerstin...
ICPADS
2005
IEEE
14 years 1 months ago
Distributed Integrity Checking for Systems with Replicated Data
This work presents a new comparison-based diagnosis model and a new algorithm, called Hi-Dif, based on this model. The algorithm is used for checking the integrity of systems with...
Roverli Pereira Ziwich, Elias Procópio Duar...