Sciweavers

91 search results - page 8 / 19
» Weak Composite Diffie-Hellman
Sort
View
WISA
2007
Springer
14 years 1 months ago
A Compositional Multiple Policies Operating System Security Model
Multilevel security policies aim at only confidentiality assurance, with less consideration on integrity assurance and weakness in expressing channel control policies. Besides, the...
Lei Xia, Wei Huang, Hao Huang
ICDE
2008
IEEE
182views Database» more  ICDE 2008»
14 years 2 months ago
Two-phase schema matching in real world relational databases
— We propose a new approach to the problem of schema matching in relational databases that merges the hybrid and composite approach of combining multiple individual matching tech...
Nikolaos Bozovic, Vasilis Vassalos
LOPSTR
2001
Springer
13 years 12 months ago
On Deforesting Parameters of Accumulating Maps
Abstract. Deforestation is a well-known program transformation technique which eliminates intermediate data structures that are passed between functions. One of its weaknesses is t...
Kazuhiko Kakehi, Robert Glück, Yoshihiko Futa...
EMMCVPR
2007
Springer
14 years 1 months ago
Compositional Object Recognition, Segmentation, and Tracking in Video
Abstract. The complexity of visual representations is substantially limited by the compositional nature of our visual world which, therefore, renders learning structured object mod...
Björn Ommer, Joachim M. Buhmann
CVPR
2007
IEEE
14 years 9 months ago
Compositional Boosting for Computing Hierarchical Image Structures
In this paper, we present a compositional boosting algorithm for detecting and recognizing 17 common image structures in low-middle level vision tasks. These structures, called &q...
Tianfu Wu, Gui-Song Xia, Song Chun Zhu