Sciweavers

575 search results - page 53 / 115
» Wichita State University
Sort
View
170
Voted
CRYPTO
2011
Springer
180views Cryptology» more  CRYPTO 2011»
14 years 3 months ago
Leakage-Resilient Zero Knowledge
In this paper, we initiate a study of zero knowledge proof systems in the presence of sidechannel attacks. Specifically, we consider a setting where a cheating verifier is allow...
Sanjam Garg, Abhishek Jain 0002, Amit Sahai
158
Voted
VMCAI
2012
Springer
13 years 11 months ago
Ideal Abstractions for Well-Structured Transition Systems
stractions for Well-Structured Transition Systems Damien Zufferey1 , Thomas Wies2 , and Thomas A. Henzinger1 1 IST Austria 2 New York University Many infinite state systems can be...
Damien Zufferey, Thomas Wies, Thomas A. Henzinger
106
Voted
ASPDAC
2007
ACM
139views Hardware» more  ASPDAC 2007»
15 years 7 months ago
Deeper Bound in BMC by Combining Constant Propagation and Abstraction
ound in BMC by Combining Constant Propagation and Abstraction Roy Armoni, Limor Fix1 , Ranan Fraer1 , Tamir Heyman1,3 , Moshe Vardi2 , Yakir Vizel1 , Yael Zbar1 1 Logic and Validat...
Roy Armoni, Limor Fix, Ranan Fraer, Tamir Heyman, ...
150
Voted
JHSN
2000
390views more  JHSN 2000»
15 years 3 months ago
Telemedicine: challenges and opportunities
Telemedicine is many things to many people. Only until a few years ago, telemedicine was equated to video teleconferencing between physicians, while nowadays, perhaps the most acti...
Sang-goo Lee, Seong K. Mun, Prakash Jha, Betty Ann...
134
Voted
CIARP
2010
Springer
15 years 2 months ago
Improving Face Segmentation in Thermograms Using Image Signatures
Abstract. The aim of this paper is to present a method for the automatic segmentation of face images captured in Long Wavelength Infrared (LWIR), allowing for a large range of face...
Silvio Filipe, Luís A. Alexandre