Sciweavers

1898 search results - page 79 / 380
» Weak Keys for IDEA
Sort
View
ECML
2007
Springer
14 years 21 days ago
On Pairwise Naive Bayes Classifiers
Class binarizations are effective methods for improving weak learners by decomposing multi-class problems into several two-class problems. This paper analyzes how these methods can...
Jan-Nikolas Sulzmann, Johannes Fürnkranz, Eyk...
HYBRID
2007
Springer
14 years 20 days ago
Safety Verification of an Aircraft Landing Protocol: A Refinement Approach
Abstract. In this paper, we propose a new approach for formal verification of hybrid systems. To do so, we present a new refinement proof technique, a weak refinement using step in...
Shinya Umeno, Nancy A. Lynch
ICB
2007
Springer
113views Biometrics» more  ICB 2007»
14 years 20 days ago
Standardization of Face Image Sample Quality
Performance of biometric systems is dependent on quality of acquired biometric samples. Poor sample quality is a main reason for matching errors in biometric systems and may be the...
Xiufeng Gao, Stan Z. Li, Rong Liu, Peiren Zhang
EUROCRYPT
2006
Springer
14 years 13 days ago
Composition Implies Adaptive Security in Minicrypt
To prove that a secure key-agreement protocol exists one must at least show P = NP. Moreover any proof that the sequential composition of two non-adaptively secure pseudorandom fun...
Krzysztof Pietrzak
FOSSACS
2006
Springer
14 years 13 days ago
A Finite Model Construction for Coalgebraic Modal Logic
In recent years, a tight connection has emerged between modal logic on the one hand and coalgebras, understood as generic transition systems, on the other hand. Here, we prove tha...
Lutz Schröder