Sciweavers

2478 search results - page 139 / 496
» Message from the Chair
Sort
View
141
Voted
INFORMATICALT
2007
122views more  INFORMATICALT 2007»
15 years 4 months ago
A Concealed t-out-of-n Signer Ambiguous Signature Scheme with Variety of Keys
In 2004, Abe et al. proposed a threshold signer-ambiguous signature scheme from variety of keys. Their scheme is a generalized case of the ring signature scheme, and it allows the ...
Ya-Fen Chang, Chin-Chen Chang, Pei-Yu Lin
139
Voted
CVPR
2007
IEEE
16 years 6 months ago
A Bio-inspired Learning Approach for the Classification of Risk Zones in a Smart Space
Learning from experience is a basic task of human brain that is not yet fulfilled satisfactorily by computers. Therefore, in recent years to cope with this issue, bio-inspired app...
Alessio Dore, Matteo Pinasco, Carlo S. Regazzoni
CDC
2008
IEEE
136views Control Systems» more  CDC 2008»
15 years 11 months ago
Distributed hypothesis testing with a fusion center: The conditionally dependent case
Abstract— The paper deals with decentralized Bayesian detection with M hypotheses, and N sensors making conditionally correlated measurements regarding these hypotheses. Each sen...
Kien C. Nguyen, Tansu Alpcan, Tamer Basar
IWPC
2008
IEEE
15 years 11 months ago
What's a Typical Commit? A Characterization of Open Source Software Repositories
The research examines the version histories of nine open source software systems to uncover trends and characteristics of how developers commit source code to version control syst...
Abdulkareem Alali, Huzefa H. Kagdi, Jonathan I. Ma...
NOCS
2008
IEEE
15 years 11 months ago
Reducing the Interconnection Network Cost of Chip Multiprocessors
This paper introduces a cost-effective technique to deal with CMP coherence protocol requirements from the interconnection network point of view. A mechanism is presented to avoid...
Pablo Abad, Valentin Puente, José-Án...