Sciweavers

2642 search results - page 61 / 529
» The development of Chez Scheme
Sort
View
SP
2009
IEEE
114views Security Privacy» more  SP 2009»
14 years 4 months ago
Formally Certifying the Security of Digital Signature Schemes
We present two machine-checked proofs of the existential unforgeability under adaptive chosen-message attacks of the Full Domain Hash signature scheme. These proofs formalize the ...
Santiago Zanella Béguelin, Gilles Barthe, B...
VTC
2008
IEEE
127views Communications» more  VTC 2008»
14 years 4 months ago
On a Practical Distributed Source Coding Scheme for Wireless Sensor Networks
— We present a practical distributed source coding scheme for deployable wireless sensor networks. To the best of our knowledge it is the first-of-its-kind practical scheme impl...
Frank Oldewurtel, Marcin Foks, Petri Mähö...
ICC
2007
IEEE
107views Communications» more  ICC 2007»
14 years 4 months ago
Time-Hopping UWB Multiuser Detection Using Adaptive Multistage Matrix Wiener Filtering Schemes
— Adaptive reduced-rank (RR) multistage matrix Wiener filtering (MMWF) techniques, based on the minimum mean-square error (MMSE) criterion, are proposed for timehopping (TH) pul...
Chia-Chang Hu, Hsuan-Yu Lin, Tsung-Hsien Liu, Yong...
AVSS
2006
IEEE
14 years 4 months ago
Recognizing Facial Expressions in Videos Using a Facial Action Analysis-Synthesis Scheme
In this paper, we propose a novel approach for facial expression analysis and recognition. The proposed approach relies on tracked facial actions provided by an appearance-based 3...
Fadi Dornaika, Bogdan Raducanu
ISORC
2005
IEEE
14 years 3 months ago
A Provenance-Aware Weighted Fault Tolerance Scheme for Service-Based Applications
Service-orientation has been proposed as a way of facilitating the development and integration of increasingly complex and heterogeneous system components. However, there are many...
Paul Townend, Paul T. Groth, Jie Xu