Sciweavers

9687 search results - page 1904 / 1938
» On Natural Mobility Models
Sort
View
CCS
2010
ACM
13 years 10 months ago
On the soundness of authenticate-then-encrypt: formalizing the malleability of symmetric encryption
A communication channel from an honest sender A to an honest receiver B can be described as a system with three interfaces labeled A, B, and E (the adversary), respectively, where...
Ueli Maurer, Björn Tackmann
ECCV
2010
Springer
13 years 10 months ago
Efficient Computation of Scale-Space Features for Deformable Shape Correspondences
Abstract. With the rapid development of fast data acquisition techniques, 3D scans that record the geometric and photometric information of deformable objects are routinely acquire...
Tingbo Hou, Hong Qin
ERCIMDL
2010
Springer
132views Education» more  ERCIMDL 2010»
13 years 10 months ago
A Visual Digital Library Approach for Time-Oriented Scientific Primary Data
Abstract. Digital Library support for textual and certain types of nontextual documents has significantly advanced over the last years. While Digital Library support implies many a...
Jürgen Bernard, Jan Brase, Dieter W. Fellner,...
ESORICS
2010
Springer
13 years 10 months ago
D(e|i)aling with VoIP: Robust Prevention of DIAL Attacks
We carry out attacks using Internet services that aim to keep telephone devices busy, hindering legitimate callers from gaining access. We use the term DIAL (Digitally Initiated A...
Alexandros Kapravelos, Iasonas Polakis, Elias Atha...
AI
2008
Springer
13 years 10 months ago
Speculative plan execution for information gathering
The execution performance of an information gathering plan can suffer significantly due to remote I/O latencies. A streaming dataflow model of execution addresses the problem to s...
Greg Barish, Craig A. Knoblock
« Prev « First page 1904 / 1938 Last » Next »