Sciweavers

1898 search results - page 48 / 380
» Weak Keys for IDEA
Sort
View
ICARCV
2008
IEEE
154views Robotics» more  ICARCV 2008»
14 years 3 months ago
Teaching a robot to operate a lift
—This paper discusses a vision problem for the detection of lift operation panel which is a plane subject to deformation due to viewing angle change. The key problem in this proj...
Han Wang, Y. Ying, V. P. Dinh, B. Y. Xie, Danwei W...
LICS
1999
IEEE
14 years 29 days ago
Proof Techniques for Cryptographic Processes
Contextual equivalences for cryptographic process calculi, like the spi-calculus, can be used to reason about correctness of protocols, but their definition suffers from quantific...
Michele Boreale, Rocco De Nicola, Rosario Pugliese
IPL
2006
87views more  IPL 2006»
13 years 8 months ago
Strongly secure ramp secret sharing schemes for general access structures
Ramp secret sharing (SS) schemes can be classified into strong ramp SS schemes and weak ramp SS schemes. The strong ramp SS schemes do not leak out any part of a secret explicitly...
Mitsugu Iwamoto, Hirosuke Yamamoto
ACL
2010
13 years 6 months ago
Boosting-Based System Combination for Machine Translation
In this paper, we present a simple and effective method to address the issue of how to generate diversified translation systems from a single Statistical Machine Translation (SMT)...
Tong Xiao, Jingbo Zhu, Muhua Zhu, Huizhen Wang
PE
2010
Springer
144views Optimization» more  PE 2010»
13 years 3 months ago
A unified framework for the bottleneck analysis of multiclass queueing networks
We introduce a new framework supporting the bottleneck analysis of closed, multiclass BCMP queueing networks in the limiting regime where the number of jobs proportionally grows t...
Jonatha Anselmi, Paolo Cremonesi