Sciweavers

813 search results - page 38 / 163
» Pipeline-centric provenance model
Sort
View
CRYPTO
2010
Springer
195views Cryptology» more  CRYPTO 2010»
13 years 8 months ago
Fully Secure Functional Encryption with General Relations from the Decisional Linear Assumption
This paper presents a fully secure functional encryption scheme for a wide class of relations, that are specified by non-monotone access structures combined with inner-product rel...
Tatsuaki Okamoto, Katsuyuki Takashima
RP
2010
Springer
126views Control Systems» more  RP 2010»
13 years 6 months ago
Lossy Counter Machines Decidability Cheat Sheet
Abstract. Lossy counter machines (LCM’s) are a variant of Minsky counter machines based on weak (or unreliable) counters in the sense that they can decrease nondeterministically ...
Philippe Schnoebelen
TCBB
2010
107views more  TCBB 2010»
13 years 6 months ago
A Metric on the Space of Reduced Phylogenetic Networks
—Phylogenetic networks are leaf-labeled, rooted, acyclic, directed graphs, that are used to model reticulate evolutionary histories. Several measures for quantifying the topologi...
Luay Nakhleh
IPMI
2003
Springer
14 years 8 months ago
Adapting Active Shape Models for 3D Segmentation of Tubular Structures in Medical Images
Active Shape Models (ASM) have proven to be an effective approach for image segmentation. In some applications, however, the linear model of gray level appearance around a contour ...
Marleen de Bruijne, Bram van Ginneken, Max A. Vier...
CAV
2005
Springer
173views Hardware» more  CAV 2005»
14 years 1 months ago
Building Your Own Software Model Checker Using the Bogor Extensible Model Checking Framework
Model checking has proven to be an effective technology for verification and debugging in hardware and more recently in software domains. We believe that recent trends in both th...
Matthew B. Dwyer, John Hatcliff, Matthew Hoosier, ...