Sciweavers

2421 search results - page 92 / 485
» Message from the Editor-in-Chief
Sort
View
CAI
2005
Springer
13 years 10 months ago
Development of Threat Evaluation Tool for Distributed Network Environment
Current information protection systems only detect and warn against individual intrusion, and are not able to provide a collective and synthesized alert message. In this paper, we ...
Keun-Hee Han, Il-Gon Kim, Kang-Won Lee, Ji-Yeon Ch...
PSYCHNOLOGY
2007
144views more  PSYCHNOLOGY 2007»
13 years 9 months ago
Texters not Talkers: Phone Call Aversion among Mobile Phone Users
This paper argues that there are two types of mobile phone user. The study focused on the interactional experience of mobile phone calls and text messages. The research involved 3...
Ruth Rettie
ICASSP
2009
IEEE
13 years 7 months ago
Fast belief propagation process element for high-quality stereo estimation
Belief propagation is a popular global optimization technique for many computer vision problems. However, it requires extensive computation due to the iterative message passing op...
Chao-Chung Cheng, Chia-Kai Liang, Yen-Chieh Lai, H...
DSS
2002
231views more  DSS 2002»
13 years 10 months ago
Computational aspects of the FLBC framework
Recent research has sought to develop formal languages for business communication as more expressive, flexible and powerful alternatives to current electronic data interchange (ED...
Aspassia Daskalopulu, Marek J. Sergot
TCC
2009
Springer
153views Cryptology» more  TCC 2009»
14 years 10 months ago
On the (Im)Possibility of Key Dependent Encryption
We study the possibility of constructing encryption schemes secure under messages that are chosen depending on the key k of the encryption scheme itself. We give the following sep...
Iftach Haitner, Thomas Holenstein