Sciweavers

2542 search results - page 176 / 509
» One step ahead
Sort
View
ICICS
2004
Springer
14 years 4 months ago
On the Minimal Assumptions of Group Signature Schemes
Abstract. One of the central lines of cryptographic research is identifying the weakest assumptions required for the construction of secure primitives. In the context of group sign...
Michel Abdalla, Bogdan Warinschi
IFIP
2004
Springer
14 years 4 months ago
Ensuring Termination by Typability
A term terminates if all its reduction sequences are of finite length. We show four type systems that ensure termination of well-typed π-calculus processes. The systems are obtai...
Yuxin Deng, Davide Sangiorgi
IPSN
2004
Springer
14 years 4 months ago
Entropy-based sensor selection heuristic for target localization
We propose an entropy-based sensor selection heuristic for localization. Given 1) a prior probability distribution of the target location, and 2) the locations and the sensing mod...
Hanbiao Wang, Kung Yao, Gregory J. Pottie, Deborah...
PCM
2004
Springer
104views Multimedia» more  PCM 2004»
14 years 4 months ago
An Image Retrieval Scheme Using Multi-instance and Pseudo Image Concepts
Abstract. Content-based image search has long been considered a difficult task. Making correct conjectures on the user intention (perception) based on the query images is a critica...
Feng-Cheng Chang, Hsueh-Ming Hang
POLICY
2004
Springer
14 years 4 months ago
Towards a Multi-dimensional Characterization of Dissemination Control
Dissemination control (DCON) is emerging as one of the most important and challenging goals for information security. DCON is concerned with controlling information and digital ob...
Roshan K. Thomas, Ravi S. Sandhu