Sciweavers

7179 search results - page 1339 / 1436
» Design for Product Adaptability
Sort
View
CORR
2010
Springer
146views Education» more  CORR 2010»
13 years 5 months ago
NLHB : A Non-Linear Hopper Blum Protocol
The Hopper-Blum (HB) protocol, which uses noised linear parities of a shared key for authentication, has been proposed for light-weight applications such as RFID. Recently, algorit...
Mukundan Madhavan, Andrew Thangaraj, Yogesh Sankar...
CCIA
2010
Springer
13 years 3 months ago
Comparison of Topologies in Peer-to-Peer Data Sharing Networks
Interactions within Multi-agent systems can be structured in different ways depending on the application scenario and its environmental restrictions. In previous work we have devel...
Jordi Campos Miralles, Nuria Piqué, Maite L...
COGSR
2010
102views more  COGSR 2010»
13 years 3 months ago
Emergence of self-organized symbol-based communication in artificial creatures
In this paper, we describe a digital scenario where we simulated the emergence of self-organized symbol-based communication among artificial creatures inhabiting a virtual world of...
Angelo Loula, Ricardo R. Gudwin, Charbel Niñ...
KAIS
2011
102views more  KAIS 2011»
13 years 3 months ago
Symbolic data analysis tools for recommendation systems
Recommendation Systems have become an important tool to cope with the information overload problem by acquiring data about the user behavior. After tracing the user behavior, throu...
Byron Leite Dantas Bezerra, Francisco de Assis Ten...
TDSC
2011
13 years 3 months ago
CASTLE: Continuously Anonymizing Data Streams
— Most of existing privacy preserving techniques, such as k-anonymity methods, are designed for static data sets. As such, they cannot be applied to streaming data which are cont...
Jianneng Cao, Barbara Carminati, Elena Ferrari, Ki...
« Prev « First page 1339 / 1436 Last » Next »