Sciweavers

1015 search results - page 126 / 203
» New Area Management Method Based on
Sort
View
CCS
2008
ACM
13 years 10 months ago
Reducing protocol analysis with XOR to the XOR-free case in the horn theory based approach
In the Horn theory based approach for cryptographic protocol analysis, cryptographic protocols and (Dolev-Yao) intruders are modeled by Horn theories and security analysis boils d...
Ralf Küsters, Tomasz Truderung
ICC
2007
IEEE
110views Communications» more  ICC 2007»
14 years 2 months ago
Distributed Early Worm Detection Based on Payload Histograms
— Epidemic worms has become a social problem owing to their potency in paralyzing the Internet, thus affecting our way of life. Recent researches have pointed out that epidemic w...
Yuji Waizumi, Masashi Tsuji, Hiroshi Tsunoda, Nirw...
SSD
2009
Springer
193views Database» more  SSD 2009»
14 years 2 months ago
Query Integrity Assurance of Location-Based Services Accessing Outsourced Spatial Databases
Outsourcing data to third party data providers is becoming a common practice for data owners to avoid the cost of managing and maintaining databases. Meanwhile, due to the populari...
Wei-Shinn Ku, Ling Hu, Cyrus Shahabi, Haixun Wang
ICCV
2003
IEEE
14 years 10 months ago
"Perspective Shape from Shading" and Viscosity Solutions
This article proposes a solution of the Lambertian shape from shading (SFS) problem in the case of a pinhole camera model (performing a perspective projection). Our approach is ba...
Emmanuel Prados, Olivier D. Faugeras
IEAAIE
2004
Springer
14 years 1 months ago
Change Summarization in Web Collections
World Wide Web is not only enormous but also dynamic information space. Every day large quantity of new information is published on web pages. Many times people want to know what a...
Adam Jatowt, Khoo Khyou Bun, Mitsuru Ishizuka