Sciweavers

236 search results - page 21 / 48
» From Weak to Strong Watermarking
Sort
View
EUROPKI
2008
Springer
13 years 11 months ago
Efficient Generic Forward-Secure Signatures and Proxy Signatures
We propose a generic method to construct forward-secure signature schemes from standard signature schemes. The proposed construction is more computationally efficient than previous...
Basel Alomair, Krishna Sampigethaya, Radha Poovend...
NECO
2010
78views more  NECO 2010»
13 years 8 months ago
Hebbian Plasticity and Homeostasis in a Model of Hypercolumn of the Visual Cortex
Neurons in the nervous system display a wide variety of plasticity processes. Among them are covariance based rules and homeostatic plasticity. By themselves, the first ones tend...
R. Rossi Pool, G. Mato
DSVIS
2003
Springer
14 years 3 months ago
Evaluating and Comparing Interaction Styles
Research has created many new generation (post-WIMP) Interaction styles (IS) in the past years. From Ubiquitous to Affective Computing, researchers have not kept a uniform standard...
Georgios Christou, Robert J. K. Jacob
CONCUR
2007
Springer
14 years 1 months ago
Equivalence Checking for Infinite Systems Using Parameterized Boolean Equation Systems
Abstract. In this paper, we provide a transformation from the branching bisimulation problem for infinite, concurrent, data-intensive systems in linear process format, into solving...
Taolue Chen, Bas Ploeger, Jaco van de Pol, Tim A. ...
SLOGICA
2010
138views more  SLOGICA 2010»
13 years 8 months ago
Extensionality and Restriction in Naive Set Theory
Abstract. The naive set theory problem is to begin with a full comprehension axiom, and to find a logic strong enough to prove theorems, but weak enough not to prove everything. T...
Zach Weber