Sciweavers

273 search results - page 44 / 55
» Bayesian Communication under Rough Sets Information
Sort
View
CRYPTO
2011
Springer
237views Cryptology» more  CRYPTO 2011»
12 years 6 months ago
Bi-Deniable Public-Key Encryption
In CRYPTO 1997, Canetti et al.put forward the intruiging notion of deniable encryption, which (informally) allows a sender and/or receiver, having already performed some encrypted...
Adam O'Neill, Chris Peikert, Brent Waters
ICIP
2006
IEEE
14 years 8 months ago
Design of a Transmission Protocol for a CVE
Virtual reality is a useful tool to train individuals for various different situations or scenarios. A single person utilizing a virtual environment can greatly enhance their skil...
Fred Stakem, Ghassan Alregib, Biing-Hwang Juang, M...
CISS
2007
IEEE
14 years 1 months ago
Bounding A Statistical Measure Of Network Lifetime For Wireless Sensor Networks
—The inherent many-to-one flow of traffic in Wireless Sensor Networks produces a skewed distribution of energy consumption rates leading to the early demise of those sensors that...
Muhammad Usman Ilyas, Hayder Radha
ACII
2007
Springer
14 years 28 days ago
Assessing Sentiment of Text by Semantic Dependency and Contextual Valence Analysis
Text is not only an important medium to describe facts and events, but also to effectively communicate information about the writer’s (positive or negative) sentiment underlying ...
Shaikh Mostafa Al Masum, Helmut Prendinger, Mitsur...
BPM
2005
Springer
118views Business» more  BPM 2005»
14 years 8 days ago
Applying Enterprise Models to Design Cooperative Scientific Environments
Scientific experiments are supported by activities that create, use, communicate and distribute information whose organizational dynamics is similar to processes performed by distr...
Andrea Bosin, Nicoletta Dessì, Maria Grazia...