Sciweavers

53 search results - page 11 / 11
» The Completeness of Propositional Resolution: A Simple and C...
Sort
View
EUROCRYPT
2010
Springer
14 years 6 days ago
Encryption Schemes Secure against Chosen-Ciphertext Selective Opening Attacks
Imagine many small devices send data to a single receiver, encrypted using the receiver’s public key. Assume an adversary that has the power to adaptively corrupt a subset of the...
Serge Fehr, Dennis Hofheinz, Eike Kiltz, Hoeteck W...
PAMI
2011
13 years 2 months ago
Action Recognition Using Mined Hierarchical Compound Features
—The field of Action Recognition has seen a large increase in activity in recent years. Much of the progress has been through incorporating ideas from single frame object recogn...
Andrew Gilbert, John Illingworth, Richard Bowden
POPL
2010
ACM
14 years 4 months ago
A Theory of Indirection via Approximation
Building semantic models that account for various kinds of indirect reference has traditionally been a difficult problem. Indirect reference can appear in many guises, such as hea...
Aquinas Hobor, Robert Dockins, Andrew W. Appel