Sciweavers

1628 search results - page 40 / 326
» Compiler Construction Using Scheme
Sort
View
KR
2004
Springer
14 years 1 months ago
Planning Graphs and Knowledge Compilation
One of the major advances in classical planning has been the development of Graphplan. Graphplan builds a layered structure called the planning graph, and then searches this struc...
Hector Geffner
POPL
2000
ACM
14 years 3 days ago
Authentication Primitives and Their Compilation
Adopting a programming-language perspective, we study the problem of implementing authentication in a distributed system. We define a process calculus with constructs for authent...
Martín Abadi, Cédric Fournet, George...
MUE
2007
IEEE
104views Multimedia» more  MUE 2007»
14 years 2 months ago
A Conference Key Distribution Scheme Using Interpolating Polynomials
Conference keys are secret keys used by a group of users commonly and with which they can encipher (or decipher) messages such that communications are secure. Based on the Diffie ...
Chin-Chen Chang, Chu-Hsing Lin, Chien-Yuan Chen
JISE
2011
113views more  JISE 2011»
13 years 2 months ago
Mandarin Singing-voice Synthesis Using an HNM Based Scheme
In this paper, HNM (harmonic plus noise model) is enhanced and used to design a scheme for synthesizing Mandarin singing voice. Enhancements made include synthesizing signals with...
Hung-Yan Gu, Huang-Liang Liao
ICICS
2005
Springer
14 years 1 months ago
Security Properties of Two Authenticated Conference Key Agreement Protocols
In this paper we analyse the security of two authenticated group key agreement schemes based on the group key agreement protocol of Burmester and Desmedt. One scheme was proposed ...
Qiang Tang, Chris J. Mitchell