Sciweavers

89222 search results - page 33 / 17845
» Which
Sort
View
SPW
1997
Springer
14 years 1 months ago
Protocol Interactions and the Chosen Protocol Attack
There are many cases in the literature in which reuse of the same key material for different functions can open up security holes. In this paper, we discuss such interactions betw...
John Kelsey, Bruce Schneier, David Wagner
CONCUR
1995
Springer
14 years 12 days ago
Fibrational Control Structures
We provide a category theoretic reformulation of control structures, which avoids explicit reference to names. The basis of the formulation is what we call a binding structure, wh...
Claudio Hermida, John Power
AAAI
2008
13 years 11 months ago
Nonmonotonic Modes of Inference
In this paper we investigate nonmonotonic `modes of inference'. Our approach uses modal (conditional) logic to establish a uniform framework in which to study nonmonotonic co...
Victor Jauregui
CCCG
2006
13 years 10 months ago
Local Overlaps In Special Unfoldings Of Convex Polyhedra
We define a notion of local overlaps in polyhedron unfoldings. We use this concept to construct convex polyhedra for which certain classes of edge unfoldings contain overlaps, the...
Brendan Lucier
ESANN
2006
13 years 10 months ago
A Gaussian process latent variable model formulation of canonical correlation analysis
Abstract. We investigate a nonparametric model with which to visualize the relationship between two datasets. We base our model on Gaussian Process Latent Variable Models (GPLVM)[1...
Gayle Leen, Colin Fyfe