Sciweavers

3921 search results - page 620 / 785
» Transforming Models with ATL
Sort
View
CTRSA
2006
Springer
140views Cryptology» more  CTRSA 2006»
15 years 8 months ago
Session Corruption Attack and Improvements on Encryption Based MT-Authenticators
Bellare, Canetti and Krawczyk proposed a security model (BCK-model) for authentication and key exchange protocols in 1998. The model not only reasonably captures the power of pract...
Xiaojian Tian, Duncan S. Wong
EKAW
2006
Springer
15 years 8 months ago
From Natural Language to Formal Proof Goal
Guidelines (Extended abstract) Ruud Stegers1 , Annette ten Teije1 , and Frank van Harmelen1 Vrije Universiteit, Amsterdam The main problem encountered when starting verification of...
Ruud Stegers, Annette ten Teije, Frank van Harmele...
CCGRID
2001
IEEE
15 years 8 months ago
Compute Power Market: Towards a Market-Oriented Grid
The Compute Power Market (CPM) is a market-based resource management and job scheduling system for grid computing on Internet-wide computational resources, particularly low-end pe...
Rajkumar Buyya, Sudharshan Vazhkudai
CVPR
2010
IEEE
15 years 7 months ago
Real-time Tracking of Multiple Occluding Objects using Level Sets
We derive a probabilistic framework for robust, realtime, visual tracking of multiple previously unseen objects from a moving camera. This framework models the discrete depth orde...
Charles Bibby, Ian Reid
BMVC
2002
15 years 6 months ago
Practical Generation of Video Textures using the Auto-Regressive Process
Recently, there have been several attempts at creating `video textures', that is, synthesising new (potentially infinitely long) video clips based on existing ones. One way t...
Neill W. Campbell, Colin J. Dalton, David P. Gibso...