Sciweavers

149 search results - page 16 / 30
» A Scheme for Obtaining a Message from the Digital Multisigna...
Sort
View
ICPR
2004
IEEE
14 years 8 months ago
Principal Component Analysis for Online Handwritten Character Recognition
In this paper, Principal Component Analysis (PCA) is applied to the problem of Online Handwritten Character Recognition in the Tamil script. The input is a temporally ordered sequ...
A. G. Ramakrishnan, Sriganesh Madhvanath, V. Deepu
DCOSS
2006
Springer
13 years 11 months ago
Efficient In-Network Processing Through Local Ad-Hoc Information Coalescence
We consider in-network processing via local message passing. The considered setting involves a set of sensors each of which can communicate with a subset of other sensors. There is...
Onur Savas, Murat Alanyali, Venkatesh Saligrama
CCS
2008
ACM
13 years 9 months ago
Multi-use unidirectional proxy re-signatures
In 1998, Blaze, Bleumer, and Strauss suggested a cryptographic primitive termed proxy re-signature in which a proxy transforms a signature computed under Alice's secret key in...
Benoît Libert, Damien Vergnaud
KDD
2003
ACM
127views Data Mining» more  KDD 2003»
14 years 8 months ago
Towards NIC-based intrusion detection
We present and evaluate a NIC-based network intrusion detection system. Intrusion detection at the NIC makes the system potentially tamper-proof and is naturally extensible to wor...
Matthew Eric Otey, Srinivasan Parthasarathy, Amol ...
WFLP
2000
Springer
163views Algorithms» more  WFLP 2000»
13 years 11 months ago
Cooperative Constraint Functional Logic Programming
We describe the current status of the development of CFLP, a system which aims at the integration of the best features of functional logic programming (FLP), cooperative constrain...
Mircea Marin, Tetsuo Ida