Sciweavers

2421 search results - page 126 / 485
» Message from the Editor-in-Chief
Sort
View
INFORMATICALT
2007
122views more  INFORMATICALT 2007»
13 years 10 months ago
A Concealed t-out-of-n Signer Ambiguous Signature Scheme with Variety of Keys
In 2004, Abe et al. proposed a threshold signer-ambiguous signature scheme from variety of keys. Their scheme is a generalized case of the ring signature scheme, and it allows the ...
Ya-Fen Chang, Chin-Chen Chang, Pei-Yu Lin
CVPR
2007
IEEE
15 years 10 days ago
A Bio-inspired Learning Approach for the Classification of Risk Zones in a Smart Space
Learning from experience is a basic task of human brain that is not yet fulfilled satisfactorily by computers. Therefore, in recent years to cope with this issue, bio-inspired app...
Alessio Dore, Matteo Pinasco, Carlo S. Regazzoni
CDC
2008
IEEE
136views Control Systems» more  CDC 2008»
14 years 4 months ago
Distributed hypothesis testing with a fusion center: The conditionally dependent case
Abstract— The paper deals with decentralized Bayesian detection with M hypotheses, and N sensors making conditionally correlated measurements regarding these hypotheses. Each sen...
Kien C. Nguyen, Tansu Alpcan, Tamer Basar
IWPC
2008
IEEE
14 years 4 months ago
What's a Typical Commit? A Characterization of Open Source Software Repositories
The research examines the version histories of nine open source software systems to uncover trends and characteristics of how developers commit source code to version control syst...
Abdulkareem Alali, Huzefa H. Kagdi, Jonathan I. Ma...
NOCS
2008
IEEE
14 years 4 months ago
Reducing the Interconnection Network Cost of Chip Multiprocessors
This paper introduces a cost-effective technique to deal with CMP coherence protocol requirements from the interconnection network point of view. A mechanism is presented to avoid...
Pablo Abad, Valentin Puente, José-Án...