Sciweavers

1898 search results - page 79 / 380
» Weak Keys for IDEA
Sort
View
121
Voted
ECML
2007
Springer
15 years 7 months ago
On Pairwise Naive Bayes Classifiers
Class binarizations are effective methods for improving weak learners by decomposing multi-class problems into several two-class problems. This paper analyzes how these methods can...
Jan-Nikolas Sulzmann, Johannes Fürnkranz, Eyk...
127
Voted
HYBRID
2007
Springer
15 years 7 months ago
Safety Verification of an Aircraft Landing Protocol: A Refinement Approach
Abstract. In this paper, we propose a new approach for formal verification of hybrid systems. To do so, we present a new refinement proof technique, a weak refinement using step in...
Shinya Umeno, Nancy A. Lynch
117
Voted
ICB
2007
Springer
113views Biometrics» more  ICB 2007»
15 years 7 months ago
Standardization of Face Image Sample Quality
Performance of biometric systems is dependent on quality of acquired biometric samples. Poor sample quality is a main reason for matching errors in biometric systems and may be the...
Xiufeng Gao, Stan Z. Li, Rong Liu, Peiren Zhang
154
Voted
EUROCRYPT
2006
Springer
15 years 7 months ago
Composition Implies Adaptive Security in Minicrypt
To prove that a secure key-agreement protocol exists one must at least show P = NP. Moreover any proof that the sequential composition of two non-adaptively secure pseudorandom fun...
Krzysztof Pietrzak
172
Voted
FOSSACS
2006
Springer
15 years 7 months ago
A Finite Model Construction for Coalgebraic Modal Logic
In recent years, a tight connection has emerged between modal logic on the one hand and coalgebras, understood as generic transition systems, on the other hand. Here, we prove tha...
Lutz Schröder