Sciweavers

544 search results - page 4 / 109
» What cannot be computed locally!
Sort
View
ISN
1998
Springer
13 years 11 months ago
See What You Sign: Secure Implementations of Digital Signatures
An expectation of a signature system is that a signatory cannot dispute a signature. Aiming at this, the following questions arise: Can documents in electronic commerce on the Inte...
Arnd Weber
IWCIA
2009
Springer
14 years 17 hour ago
What Does Digital Straightness Tell about Digital Convexity?
Abstract. The paper studies local convexity properties of parts of digital boundaries. An online and linear-time algorithm is introduced for the decomposition of a digital boundary...
Tristan Roussillon, Laure Tougne, Isabelle Sivigno...
IWCMC
2006
ACM
14 years 1 months ago
What does using TCP as an evaluation tool reveal about MANET routing protocols?
Past research studying the operations of TCP over wireless/mobile ad hoc networks has shown that TCP cannot be adopted as-is for use in mobile ad hoc networks (MANET) to achieve r...
Sundaram Rajagopalan, Chien-Chung Shen
ECSA
2010
Springer
13 years 7 months ago
Formal approach to security metrics.: what does "more secure" mean for you?
Security metrics are the tools for providing correct and upto-date information about a state of security. This information is essential for managing security efficiently. Although...
Leanid Krautsevich, Fabio Martinelli, Artsiom Yaut...
ICCV
2007
IEEE
14 years 9 months ago
What, where and who? Classifying events by scene and object recognition
We propose a first attempt to classify events in static images by integrating scene and object categorizations. We define an event in a static image as a human activity taking pla...
Li-Jia Li, Fei-Fei Li 0002