Sciweavers

366 search results - page 28 / 74
» Synthesis: Words and Traces
Sort
View
SCN
2011
Springer
292views Communications» more  SCN 2011»
13 years 3 months ago
Synthesis of attack actions using model checking for the verification of security protocols
Model checking cryptographic protocols have evolved to a valuable method for discovering counterintuitive security flaws, which make possible for a hostile agent to subvert the go...
Stylianos Basagiannis, Panagiotis Katsaros, Andrew...
CGF
2008
131views more  CGF 2008»
13 years 8 months ago
Peek-in-the-Pic: Flying Through Architectural Scenes From a Single Image
Many casually taken "tourist" photographs comprise of architectural objects like houses, buildings, etc. Reconstructing such 3D scenes captured in a single photograph is...
Amit Shesh, Baoquan Chen
IH
2009
Springer
14 years 3 months ago
Estimating the Minimal Length of Tardos Code
Abstract. This paper estimates the minimal length of a binary probabilistic traitor tracing code. We consider the code construction proposed by G. Tardos in 2003, with the symmetri...
Teddy Furon, Luis Pérez-Freire, Arnaud Guya...
SIGGRAPH
1999
ACM
14 years 24 days ago
Real-Time Acoustic Modeling for Distributed Virtual Environments
Realistic acoustic modeling is essential for spatializing sound in distributed virtual environments where multiple networked users move around and interact visually and aurally in...
Thomas A. Funkhouser, Patrick Min, Ingrid Carlbom
SIGGRAPH
1989
ACM
14 years 16 days ago
Algorithms for solid noise synthesis
A solid noise is a function that defines a random value at each point in space. Solid noises have immediate and powerful applications in surface texturing, stochastic modeling, a...
J. P. Lewis