Sciweavers

3356 search results - page 473 / 672
» Determining Consensus Numbers
Sort
View
CCS
2008
ACM
14 years 19 days ago
Secure neighbor discovery in wireless networks: formal investigation of possibility
Wireless communication enables a broad spectrum of applications, ranging from commodity to tactical systems. Neighbor discovery (ND), that is, determining which devices are within...
Marcin Poturalski, Panos Papadimitratos, Jean-Pier...
CISC
2008
Springer
152views Cryptology» more  CISC 2008»
14 years 19 days ago
Privacy for Private Key in Signatures
One of the important applications of digital signature is anonymous credential or pseudonym system. In these scenarios, it is essential that the identity of the signer is kept secr...
Qianhong Wu, Bo Qin, Yi Mu, Willy Susilo
CSL
2008
Springer
14 years 13 days ago
Quantitative Languages
Quantitative generalizations of classical languages, which assign to each word a real number instead of a boolean value, have applications in modeling resource-constrained computat...
Krishnendu Chatterjee, Laurent Doyen, Thomas A. He...
CVPR
2008
IEEE
14 years 13 days ago
Probabilistic multi-tensor estimation using the Tensor Distribution Function
Diffusion weighted magnetic resonance (MR) imaging is a powerful tool that can be employed to study white matter microstructure by examining the 3D displacement profile of water m...
Alex D. Leow, Siwei Zhu, Katie McMahon, Greig I. d...
DAS
2008
Springer
14 years 13 days ago
A Comparison of Clustering Methods for Word Image Indexing
In this paper we explore the effectiveness of three clustering methods used to perform word image indexing. The three methods are: the Self-Organazing Map (SOM), the Growing Hiera...
Simone Marinai, Emanuele Marino, Giovanni Soda