Sciweavers

769 search results - page 57 / 154
» Simple Composition of Nets
Sort
View
ASIACRYPT
2010
Springer
13 years 5 months ago
Limitations on Transformations from Composite-Order to Prime-Order Groups: The Case of Round-Optimal Blind Signatures
sion of an extended abstract published in Proceedings of Asiacrypt 2010, Springer-Verlag, 2010. Available from the IACR Cryptology ePrint Archive as Report 2010/474. Beginning wit...
Sarah Meiklejohn, Hovav Shacham, David Mandell Fre...
CHI
2003
ACM
14 years 8 months ago
An interactive poster exhibit puts visitors in the picture, in real time
This describes the usability and interaction challenges in creating a unique museum exhibit which utilized real-time compositing, and sought to hide complex computational and netw...
Kevin Walker
ICIP
2003
IEEE
14 years 9 months ago
LLRT based detection of LSB hiding
In this paper we consider a hypothesis testing approach for detection of hiding in the least significant bit (LSB). This steganalysis problem is a composite hypothesis testing pro...
Kenneth Sullivan, Onkar Dabeer, Upamanyu Madhow, B...
LOPSTR
2001
Springer
14 years 3 days ago
On Deforesting Parameters of Accumulating Maps
Abstract. Deforestation is a well-known program transformation technique which eliminates intermediate data structures that are passed between functions. One of its weaknesses is t...
Kazuhiko Kakehi, Robert Glück, Yoshihiko Futa...
SOSYM
2010
124views more  SOSYM 2010»
13 years 6 months ago
Lifting transformational models of product lines: a case study
Model driven development (MDD) of software product lines (SPLs) merges two increasing important paradigms that synthesize programs by transformation. MDD creates programs by transf...
Greg Freeman, Don S. Batory, R. Greg Lavender, Jac...