Sciweavers

220 search results - page 17 / 44
» ideal 2005
Sort
View
ICALP
2005
Springer
14 years 4 months ago
Computationally Sound Implementations of Equational Theories Against Passive Adversaries
In this paper we study the link between formal and cryptographic models for security protocols in the presence of a passive adversary. In contrast to other works, we do not conside...
Mathieu Baudet, Véronique Cortier, Steve Kr...
ICDT
2005
ACM
116views Database» more  ICDT 2005»
14 years 4 months ago
The Design Space of Type Checkers for XML Transformation Languages
Abstract. We survey work on statically type checking XML transformations, covering a wide range of notations and ambitions. The concept of type may vary from idealizations of DTD t...
Anders Møller, Michael I. Schwartzbach
ICIAR
2005
Springer
14 years 4 months ago
Vector Median Root Signals Determination for cDNA Microarray Image Segmentation
Abstract. This paper presents a new cDNA microarray image segmentation framework. The framework uses robust vector median filtering to generate a root sigLnal which is an image ob...
Rastislav Lukac, Konstantinos N. Plataniotis
IH
2005
Springer
14 years 4 months ago
Translation-Based Steganography
This paper investigates the possibilities of steganographically embedding information in the \noise" created by automatic translation of natural language documents. Because th...
Christian Grothoff, Krista Grothoff, Ludmila Alkhu...
ISSAC
2005
Springer
119views Mathematics» more  ISSAC 2005»
14 years 4 months ago
Computing the multiplicity structure in solving polynomial systems
This paper presents a duality analysis and an algorithm for computing the multiplicity structure of a zero to a polynomial system, while the zero can be exact or approximate with ...
Barry H. Dayton, Zhonggang Zeng