Sciweavers

7607 search results - page 1476 / 1522
» informs 2006
Sort
View
CRYPTO
2006
Springer
155views Cryptology» more  CRYPTO 2006»
14 years 13 days ago
A Method for Making Password-Based Key Exchange Resilient to Server Compromise
This paper considers the problem of password-authenticated key exchange (PAKE) in a client-server setting, where the server authenticates using a stored password file, and it is de...
Craig Gentry, Philip D. MacKenzie, Zulfikar Ramzan
CSL
2006
Springer
14 years 11 days ago
Game Quantification on Automatic Structures and Hierarchical Model Checking Games
Game quantification is an expressive concept and has been studied in model theory and descriptive set theory, especially in relation to infinitary logics. Automatic structures on t...
Lukasz Kaiser
CSR
2006
Springer
14 years 11 days ago
Conjugacy and Equivalence of Weighted Automata and Functional Transducers
We show that two equivalent K-automata are conjugate to a third one, when K is equal to B, N, Z, or any (skew) field and that the same holds true for functional tranducers as well....
Marie-Pierre Béal, Sylvain Lombardy, Jacque...
CVPR
2006
IEEE
14 years 11 days ago
Multiple Face Model of Hybrid Fourier Feature for Large Face Image Set
The face recognition system based on the only single classifier considering the restricted information can not guarantee the generality and superiority of performances in a real s...
Wonjun Hwang, Gyu-tae Park, Jong Ha Lee, Seok-Cheo...
DILS
2006
Springer
14 years 11 days ago
An Extensible Light-Weight XML-Based Monitoring System for Sequence Databases
Life science researchers want biological information in their interest to become available to them as soon as possible. A monitoring system is a solution that relieves biologists f...
Dieter Van de Craen, Frank Neven, Kerstin Koch
« Prev « First page 1476 / 1522 Last » Next »