Sciweavers

1898 search results - page 12 / 380
» Weak Keys for IDEA
Sort
View
IANDC
2010
116views more  IANDC 2010»
13 years 7 months ago
Weak bisimulation is sound and complete for pCTL*
Abstract. We investigate weak bisimulation of probabilistic systems in the presence of nondeterminism, i.e. labelled concurrent Markov chains (LCMC) with silent transitions. We bui...
Josée Desharnais, Vineet Gupta, Radha Jagad...
WETICE
2006
IEEE
14 years 2 months ago
Co-Presence Communities: Using Pervasive Computing to Support Weak Social Networks
Although the strongest social relationships feature most prominently in our lives, we also maintain a multitude of much weaker connections: the distant colleagues that we share a ...
Jamie Lawrence, Terry R. Payne, David De Roure
SOFSEM
2009
Springer
14 years 5 months ago
Weaknesses of Cuckoo Hashing with a Simple Universal Hash Class: The Case of Large Universes
Cuckoo hashing was introduced by Pagh and Rodler in 2001 [12]. A set S of n keys is stored in two tables T1 and T2 each of which has m cells of capacity 1 such that constant access...
Martin Dietzfelbinger, Ulf Schellbach
EUROCRYPT
2006
Springer
14 years 8 days ago
Luby-Rackoff Ciphers from Weak Round Functions?
The Feistel-network is a popular structure underlying many block-ciphers where the cipher is constructed from many simpler rounds, each defined by some function which is derived fr...
Ueli M. Maurer, Yvonne Anne Oswald, Krzysztof Piet...
ECCV
2008
Springer
14 years 10 months ago
Weakly Supervised Object Localization with Stable Segmentations
Multiple Instance Learning (MIL) provides a framework for training a discriminative classifier from data with ambiguous labels. This framework is well suited for the task of learni...
Carolina Galleguillos, Boris Babenko, Andrew Rabin...