Sciweavers

1399 search results - page 233 / 280
» Multi-party Finite Computations
Sort
View
158
Voted
ACNS
2006
Springer
92views Cryptology» more  ACNS 2006»
15 years 10 months ago
Real Perfect Contrast Visual Secret Sharing Schemes with Reversing
The visual secret sharing (VSS for short) scheme is a secret image sharing scheme. A secret image is visually revealed from overlapping shadow images without additional computation...
Ching-Nung Yang, Chung-Chun Wang, Tse-Shih Chen
HAPTICS
2005
IEEE
15 years 9 months ago
The Effect of Fingertip Microstructures on Tactile Edge Perception
People rely on tactile edge localization to ascertain the location and structure of edges. When pressure is applied to the skin, skin mechanoreceptors convert compressive stress/s...
Gregory J. Gerling, Geb W. Thomas
122
Voted
ITCC
2005
IEEE
15 years 9 months ago
Disciplined Methods of Software Specification: A Case Study
We describe our experience applying tabular mathematical approaches to software specifications. Our purpose is to show alternative approaches to writing tabular specifications and...
Robert L. Baber, David Lorge Parnas, Sergiy A. Vil...
ICCS
2004
Springer
15 years 9 months ago
Crack Analysis in Single Plate Stressing of Particle Compounds
Particle compound material is the composition of different particles with inhomogeneous and non-uniform properties. Particle compound material is the most complicated engineering m...
Manoj Khanal, Wolfgang Schubert, Jürgen Tomas
CEC
2003
IEEE
15 years 9 months ago
Learning DFA: evolution versus evidence driven state merging
Learning Deterministic Finite Automata (DFA) is a hard task that has been much studied within machine learning and evolutionary computation research. This paper presents a new met...
Simon M. Lucas, T. Jeff Reynolds