Sciweavers

298 search results - page 46 / 60
» Strong Anonymous Signatures
Sort
View
ICIP
2005
IEEE
14 years 9 months ago
Localization and security enhancement of block-based image authentication
Most block-based image authentication techniques that are presented in the literature sacrifice localization accuracy in order to resist vector quantization (VQ) counterfeiting att...
Abdelkader H. Ouda, Mahmoud R. El-Sakka
EPIA
2005
Springer
14 years 27 days ago
Reducing Propositional Theories in Equilibrium Logic to Logic Programs
The paper studies reductions of propositional theories in equilibrium logic to logic programs under answer set semantics. Specifically we are concerned with the question of how to...
Pedro Cabalar, David Pearce, Agustín Valver...
DDECS
2006
IEEE
88views Hardware» more  DDECS 2006»
14 years 1 months ago
Minimization of Large State Spaces using Symbolic Branching Bisimulation
Abstract: Bisimulations in general are a powerful concept to minimize large finite state systems regarding some well-defined observational behavior. In contrast to strong bisimul...
Ralf Wimmer, Marc Herbstritt, Bernd Becker
BIRTHDAY
2008
Springer
13 years 9 months ago
Finite Dimensional Vector Spaces Are Complete for Traced Symmetric Monoidal Categories
We show that the category FinVectk of finite dimensional vector spaces and linear maps over any field k is (collectively) complete for the traced symmetric monoidal category freely...
Masahito Hasegawa, Martin Hofmann, Gordon D. Plotk...
WINE
2007
Springer
97views Economy» more  WINE 2007»
14 years 1 months ago
K-NCC: Stability Against Group Deviations in Non-cooperative Computation
A function is non-cooperative computable [NCC] if honest agents can compute it by reporting truthfully their private inputs, while unilateral deviations by the players are not bene...
Itai Ashlagi, Andrey Klinger, Moshe Tennenholtz