Sciweavers

1116 search results - page 122 / 224
» Key Agreement Using Statically Keyed Authenticators
Sort
View
KI
2009
Springer
14 years 14 days ago
Beyond Public Announcement Logic: An Alternative Approach to Some AI Puzzles
In the paper we present a dynamic model of knowledge. The model is inspired by public announcement logic and an approach to a puzzle concerning knowledge and communication using th...
Pawel Garbacz, Piotr Kulicki, Marek Lechniak, Robe...
JIT
1999
Springer
81views Database» more  JIT 1999»
14 years 4 days ago
A Jini-based Gateway Architecture for Mobile Devices
In the near future we expect a widespread deployment of mobile computational resources including network-enabled end devices like Laptops and PDAs. An interesting problem then and ...
Gerd Aschemann, Roger Kehr, Andreas Zeidler
IICAI
2007
13 years 9 months ago
Modeling Temporal Behavior via Structured Hidden Markov Models: an Application to Keystroking Dynamics
Structured Hidden Markov Models (S-HMM) are a variant of Hierarchical Hidden Markov Models; it provides an abstraction mechanism allowing a high level symbolic description of the k...
Ugo Galassi, Attilio Giordana, Charbel Julien, Lor...
CORR
2010
Springer
83views Education» more  CORR 2010»
13 years 8 months ago
Recursive Secret Sharing for Distributed Storage and Information Hiding
Abstract--This paper presents a recursive computational multisecret sharing technique that hides k - 2 secrets of size b each into n shares of a single secret S of size b, such tha...
Abhishek Parakh, Subhash Kak
ISBI
2009
IEEE
14 years 2 months ago
Fundamental Analysis of Lateral Displacement Estimation Quality in Ultrasound Elastography
Complementary to axial, lateral displacement and strain can provide important information on the biological soft tissues in all applications of elastography. In this paper, the ef...
Jianwen Luo, Elisa E. Konofagou