Sciweavers

35 search results - page 6 / 7
» Probabilistic Datalog - A Logic For Powerful Retrieval Metho...
Sort
View
TCC
2004
Springer
173views Cryptology» more  TCC 2004»
14 years 23 days ago
Soundness of Formal Encryption in the Presence of Active Adversaries
Abstract. We present a general method to prove security properties of cryptographic protocols against active adversaries, when the messages exchanged by the honest parties are arbi...
Daniele Micciancio, Bogdan Warinschi
DATE
2008
IEEE
76views Hardware» more  DATE 2008»
14 years 1 months ago
Signal Probability Based Statistical Timing Analysis
VLSI timing analysis and power estimation target the same circuit switching activity. Power estimation techniques are categorized as (1) static, (2) statistical, and (3) simulatio...
Bao Liu
ICMCS
2006
IEEE
174views Multimedia» more  ICMCS 2006»
14 years 1 months ago
Web Image Mining Based on Modeling Concept-Sensitive Salient Regions
In this paper, we propose a probabilistic model for web image mining, which is based on concept-sensitive salient regions without human intervene. Our goal is to achieve a middle-...
Jing Liu, Qingshan Liu, Jinqiao Wang, Hanqing Lu, ...
SIGSOFT
2007
ACM
14 years 8 months ago
Quantitative verification: models techniques and tools
Automated verification is a technique for establishing if certain properties, usually expressed in temporal logic, hold for a system model. The model can be defined using a high-l...
Marta Z. Kwiatkowska
ISB
2002
140views more  ISB 2002»
13 years 7 months ago
Computer system "Gene Discovery" for promoter structure analysis
Data Mining and Knowledge Discovery techniques proved to be efficient tools for variety of complex tasks in biology including DNA research. This paper presents implementation of th...
Eugenii E. Vityaev, Yuri L. Orlov, Oleg V. Vishnev...