Sciweavers

784 search results - page 151 / 157
» Relaxing the Value Restriction
Sort
View
CCS
2008
ACM
13 years 9 months ago
Efficient attributes for anonymous credentials
We extend the Camenisch-Lysyanskaya anonymous credential system such that selective disclosure of attributes becomes highly efficient. The resulting system significantly improves ...
Jan Camenisch, Thomas Groß
CIARP
2008
Springer
13 years 9 months ago
Pose Estimation for Sensors Which Capture Cylindric Panoramas
This paper shows that there exist linear models for sensor pose estimation for multi-view panoramas defined by a symmetric or leveled pair of cylindric images. It assumes that pair...
Fay Huang, Reinhard Klette, Yun-Hao Xie
PEWASUN
2007
ACM
13 years 9 months ago
Worst-case lifetime computation of a wireless sensor network by model-checking
Wireless Sensor Network (WSN) technology is now mature enough to be used in numerous application domains. However, due to the restricted amount of energy usually allocated to each...
Laurent Mounier, Ludovic Samper, Wassim Znaidi
COOTS
1997
13 years 9 months ago
MiSFIT: A Tool for Constructing Safe Extensible C++ Systems
The boundary between application and system is becoming increasingly permeable. Extensible applications, such as web browsers, database systems, and operating systems, demonstrate...
Christopher Small
BMCBI
2008
111views more  BMCBI 2008»
13 years 7 months ago
Comparative optimism in models involving both classical clinical and gene expression information
Background: In cancer research, most clinical variables have already been investigated and are now well established. The use of transcriptomic variables has raised two problems: r...
Caroline Truntzer, Delphine Maucort-Boulch, Pascal...