Sciweavers

503 search results - page 11 / 101
» An Independence Relation for Sets of Secrets
Sort
View
ACNS
2006
Springer
167views Cryptology» more  ACNS 2006»
14 years 5 days ago
Public Key Cryptography Sans Certificates in Ad Hoc Networks
Abstract. Several researchers have proposed the use of threshold cryptographic model to enable secure communication in ad hoc networks without the need of a trusted center. In this...
Nitesh Saxena
TASLP
2008
158views more  TASLP 2008»
13 years 8 months ago
Score-Independent Audio Features for Description of Music Expression
Abstract--During a music performance, the musician adds expressiveness to the musical message by changing timing, dynamics, and timbre of the musical events to communicate an expre...
Luca Mion, Giovanni De Poli
WEBDB
1998
Springer
96views Database» more  WEBDB 1998»
14 years 20 days ago
Extracting Patterns and Relations from the World Wide Web
The World Wide Web is a vast resource for information. At the same time it is extremely distributed. A particular type of data such as restaurant lists maybe scattered across thous...
Sergey Brin
FSS
2010
97views more  FSS 2010»
13 years 7 months ago
An early approach toward graded identity and graded membership in set theory
The paper considers an early approach toward a (fuzzy) set theory with a graded membership predicate and a graded equality relation which had been developed by the German mathemat...
Siegfried Gottwald
RSKT
2010
Springer
13 years 6 months ago
Naive Bayesian Rough Sets
A naive Bayesian classifier is a probabilistic classifier based on Bayesian decision theory with naive independence assumptions, which is often used for ranking or constructing a...
Yiyu Yao, Bing Zhou