Sciweavers

3638 search results - page 25 / 728
» Distribution chain security
Sort
View
ECML
2005
Springer
14 years 1 months ago
Inducing Hidden Markov Models to Model Long-Term Dependencies
We propose in this paper a novel approach to the induction of the structure of Hidden Markov Models. The induced model is seen as a lumped process of a Markov chain. It is construc...
Jérôme Callut, Pierre Dupont
ACISP
2001
Springer
14 years 6 days ago
On Classifying Conference Key Distribution Protocols
In this paper, we examine a classification of conference key distribution protocols proposed in [4] and show that no known protocol satisfies the security requirements in class 4...
Shahrokh Saeednia, Reihaneh Safavi-Naini, Willy Su...
CORR
2011
Springer
181views Education» more  CORR 2011»
13 years 2 months ago
Study of Throughput and Delay in Finite-Buffer Line Networks
—In this work, we study the effects of finite buffers on the throughput and delay of line networks with erasure links. We identify the calculation of performance parameters such...
Badri N. Vellambi, Nima Torabkhani, Faramarz Fekri
WISTP
2007
Springer
14 years 1 months ago
Distributed Certified Information Access for Mobile Devices
Aniello Del Sorbo, Clemente Galdi, Giuseppe Persia...