Sciweavers

894 search results - page 119 / 179
» Secure Implementation of Channel Abstractions
Sort
View
CAIP
2011
Springer
253views Image Analysis» more  CAIP 2011»
12 years 9 months ago
Detection of Retinal Vascular Bifurcations by Trainable V4-Like Filters
Abstract. The detection of vascular bifurcations in retinal fundus images is important for finding signs of various cardiovascular diseases. We propose a novel method to detect su...
George Azzopardi, Nicolai Petkov
INFOCOM
2011
IEEE
13 years 13 days ago
Experimental evaluation of optimal CSMA
Abstract—By ‘optimal CSMA’ we denote a promising approach to maximize throughput-based utility in wireless networks without message passing or synchronization among nodes. De...
Bruno Nardelli, Jinsung Lee, Kangwook Lee, Yung Yi...
JUCS
2008
162views more  JUCS 2008»
13 years 9 months ago
Composition and Run-time Adaptation of Mismatching Behavioural Interfaces
Abstract: Reuse of software entities such as components or Web services raise composition issues since, most of the time, they present mismatches in their interfaces. These mismatc...
Javier Cámara, Gwen Salaün, Carlos Can...
LPAR
2007
Springer
14 years 3 months ago
Operational and Epistemic Approaches to Protocol Analysis: Bridging the Gap
Operational models of (security) protocols, on one hand, are readable and conveniently match their implementation (at a certain abstraction level). Epistemic models, on the other h...
Francien Dechesne, Mohammad Reza Mousavi, Simona O...
PKC
2009
Springer
240views Cryptology» more  PKC 2009»
14 years 9 months ago
Distributed Public-Key Cryptography from Weak Secrets
Abstract.We introduce the notion of distributed password-based publickey cryptography, where a virtual high-entropy private key is implicitly dened as a concatenation of low-entrop...
Céline Chevalier, David Pointcheval, Michel...