Sciweavers

10458 search results - page 1826 / 2092
» Modeling Features at Runtime
Sort
View
ADHOCNOW
2007
Springer
14 years 3 months ago
Information Brokerage Via Location-Free Double Rulings
The in-network aggregation and processing of information is what sets a sensor network apart from a pure data acquisition device. One way to model the exchange of information betwe...
Stefan Funke, Imran Rauf
ASIACRYPT
2007
Springer
14 years 3 months ago
Miniature CCA2 PK Encryption: Tight Security Without Redundancy
ersion of an extended abstract to be published in Advances in Cryptology—ASIACRYPT 2007, Springer-Verlag, 2007. Available online from: http://www.cs.stanford.edu/∼xb/asiacrypt0...
Xavier Boyen
BVAI
2007
Springer
14 years 3 months ago
Neural Object Recognition by Hierarchical Learning and Extraction of Essential Shapes
We present a hierarchical system for object recognition that models neural mechanisms of visual processing identified in the mammalian ventral stream. The system is composed of ne...
Daniel Oberhoff, Marina Kolesnik
CONTEXT
2007
Springer
14 years 3 months ago
Coping with Unconsidered Context of Formalized Knowledge
The paper focuses on a difficult problem when formalizing knowledge: What about the possible concepts that didn’t make it into the formalization? We call such concepts the uncons...
Stefan Mandl, Bernd Ludwig
CTRSA
2007
Springer
111views Cryptology» more  CTRSA 2007»
14 years 3 months ago
A Practical and Tightly Secure Signature Scheme Without Hash Function
In 1999, two signature schemes based on the flexible RSA problem (a.k.a. strong RSA problem) were independently introduced: the Gennaro-Halevi-Rabin (GHR) signature scheme and the...
Benoît Chevallier-Mames, Marc Joye
« Prev « First page 1826 / 2092 Last » Next »