Sciweavers

10604 search results - page 2043 / 2121
» Computational Fluid Dynamics
Sort
View
ASIACRYPT
2007
Springer
14 years 3 months ago
Blind Identity-Based Encryption and Simulatable Oblivious Transfer
An extended abstract of this paper appears in Kaoru Kurosawa (Ed.): Advances in Cryptology ASIACRYPT 2007, volume 4833 of Lecture Notes in Computer Science, pages 265–282, Spring...
Matthew Green, Susan Hohenberger
ATAL
2007
Springer
14 years 3 months ago
Multiagent reinforcement learning and self-organization in a network of agents
To cope with large scale, agents are usually organized in a network such that an agent interacts only with its immediate neighbors in the network. Reinforcement learning technique...
Sherief Abdallah, Victor R. Lesser
CIKM
2007
Springer
14 years 3 months ago
Link analysis using time series of web graphs
Link analysis is a key technology in contemporary web search engines. Most of the previous work on link analysis only used information from one snapshot of web graph. Since commer...
Lei Yang, Lei Qi, Yan-Ping Zhao, Bin Gao, Tie-Yan ...
CIVR
2007
Springer
231views Image Analysis» more  CIVR 2007»
14 years 3 months ago
Classification of video events using 4-dimensional time-compressed motion features
Among the various types of semantic concepts modeled, events pose the greatest challenge in terms of computational power needed to represent the event and accuracy that can be ach...
Alexander Haubold, Milind R. Naphade
ESAS
2007
Springer
14 years 3 months ago
Authenticating DSR Using a Novel Multisignature Scheme Based on Cubic LFSR Sequences
The problem of secure routing in mobile ad hoc networks is long-standing and has been extensively studied by researchers. Recently, techniques of aggregating signatures have been a...
Saikat Chakrabarti 0002, Santosh Chandrasekhar, Mu...
« Prev « First page 2043 / 2121 Last » Next »