Sciweavers

70 search results - page 8 / 14
» A Note on The Rogers-Fine Identity
Sort
View
EUROPKI
2004
Springer
14 years 4 months ago
Threshold Password-Based Authentication Using Bilinear Pairings
We present a new threshold password-based authentication protocol that allows a roaming user(a user who accesses a network from different client terminals) to download a private k...
Songwon Lee, Kyusuk Han, Seok-kyu Kang, Kwangjo Ki...
MFCS
2001
Springer
14 years 3 months ago
The Size of Power Automata
We describe a class of simple transitive semiautomata that exhibit full exponential blow-up during deterministic simulation. For arbitrary semiautomata we show that it is PSPACE-c...
Klaus Sutner
PAMI
2007
220views more  PAMI 2007»
13 years 10 months ago
Automatic Age Estimation Based on Facial Aging Patterns
While recognition of most facial variations, such as identity, expression and gender, has been extensively studied, automatic age estimation has rarely been explored. In contrast ...
Xin Geng, Zhi-Hua Zhou, Kate Smith-Miles
PUC
2008
120views more  PUC 2008»
13 years 9 months ago
Technology scruples: why intimidation will not save the recording industry and how enchantment might
While the recording industry continues to lobby for increasingly draconian laws to protect their interests, users of digital technology continue to share files and copy protected ...
Mark Blythe, Peter C. Wright
TCOM
2010
106views more  TCOM 2010»
13 years 9 months ago
Achievable information rates for channels with insertions, deletions, and intersymbol interference with i.i.d. inputs
—We propose to use various trellis structures to characterize different types of insertion and deletion channels. We start with binary independent and identically distributed (i....
Jun Hu, Tolga M. Duman, M. Fatih Erden, Aleksandar...