Sciweavers

10996 search results - page 2134 / 2200
» Future Directions in Computing
Sort
View
CCS
2005
ACM
14 years 2 months ago
Preventing attribute information leakage in automated trust negotiation
Automated trust negotiation is an approach which establishes trust between strangers through the bilateral, iterative disclosure of digital credentials. Sensitive credentials are ...
Keith Irwin, Ting Yu
EUROCRYPT
2005
Springer
14 years 2 months ago
Approximate Quantum Error-Correcting Codes and Secret Sharing Schemes
It is a standard result in the theory of quantum error-correcting codes that no code of length n can fix more than n/4 arbitrary errors, regardless of the dimension of the coding ...
Claude Crépeau, Daniel Gottesman, Adam Smit...
EVOW
2005
Springer
14 years 2 months ago
Convergence Synthesis of Dynamic Frequency Modulation Tones Using an Evolution Strategy
This paper reports on steps that have been taken to enhance previously presented evolutionary sound matching work. In doing so, the convergence characteristics are shown to provide...
Thomas J. Mitchell, Anthony G. Pipe
HPCC
2005
Springer
14 years 2 months ago
A Hybrid Web Server Architecture for Secure e-Business Web Applications
Nowadays the success of many e-commerce applications, such as on-line banking, depends on their reliability, robustness and security. Designing a web server architecture that keep...
Vicenç Beltran, David Carrera, Jordi Guitar...
ICNC
2005
Springer
14 years 2 months ago
Line-Based PCA and LDA Approaches for Face Recognition
Principal Component Analysis (PCA) and Linear Discriminant Analysis (LDA) techniques are important and well-developed area of image recognition and to date many linear discriminati...
Vo Dinh Minh Nhat, Sungyoung Lee
« Prev « First page 2134 / 2200 Last » Next »