Sciweavers

813 search results - page 22 / 163
» Pipeline-centric provenance model
Sort
View
IMA
1997
Springer
211views Cryptology» more  IMA 1997»
13 years 11 months ago
Key Agreement Protocols and Their Security Analysis
This paper proposes new protocols for two goals: authenticated key agreement and authenticated key agreement with key con rmation in the asymmetric public-key setting. A formalm...
Simon Blake-Wilson, Don Johnson, Alfred Menezes
CCS
2006
ACM
13 years 11 months ago
Ring signatures without random oracles
Since the formalization of ring signature by Rivest, Shamir and Tauman in 2001, there are lots of variations appeared in the literature. Almost all of the variations rely on the ra...
Sherman S. M. Chow, Victor K.-W. Wei, Joseph K. Li...
HPDC
2010
IEEE
13 years 8 months ago
Data parallelism in bioinformatics workflows using Hydra
Large scale bioinformatics experiments are usually composed by a set of data flows generated by a chain of activities (programs or services) that may be modeled as scientific work...
Fábio Coutinho, Eduardo S. Ogasawara, Danie...
CVPR
2006
IEEE
14 years 1 months ago
Discriminative Object Class Models of Appearance and Shape by Correlatons
This paper presents a new model of object classes which incorporates appearance and shape information jointly. Modeling objects appearance by distributions of visual words has rec...
Silvio Savarese, John M. Winn, Antonio Criminisi
SPIN
1999
Springer
13 years 12 months ago
Model Checking for Managers
Model checking is traditionally applied to computer system design. It has proven to be a valuable technique. However, it requires detailed specifications of systems and requirement...
Wil Janssen, Radu Mateescu, Sjouke Mauw, Peter Fen...