Sciweavers

1721 search results - page 82 / 345
» On Active and Passive Testing
Sort
View
INFORMATICALT
2006
105views more  INFORMATICALT 2006»
15 years 4 months ago
Adaptive Chosen Ciphertext Secure Threshold Key Escrow Scheme from Pairing
This paper proposes a threshold key escrow scheme from pairing. It tolerates the passive adversary to access any internal data of corrupted key escrow agents and the active adversa...
Yu Long, Kefei Chen, Shengli Liu
IJON
2007
73views more  IJON 2007»
15 years 4 months ago
A biophysical model of short-term plasticity at the calyx of Held
The calyx of Held is a giant glutamatergic synapse in the auditory system and displays multiple forms of short-term facilitation and depression. This study presents a detailed mod...
Matthias H. Hennig, Michael Postlethwaite, Ian D. ...
JCNS
2002
72views more  JCNS 2002»
15 years 4 months ago
Noise and the PSTH Response to Current Transients: II. Integrate-and-Fire Model with Slow Recovery and Application to Motoneuron
A generalized version of the integrate-and-fire model is presented that qualitatively reproduces firing rates and membrane trajectories of motoneurons. The description is based on ...
Alix Herrmann, Wulfram Gerstner
ICRA
2010
IEEE
106views Robotics» more  ICRA 2010»
15 years 2 months ago
Computing push plans for disk-shaped robots
Suppose we want to move a passive object along a given path, among obstacles in the plane, by pushing it with an active robot. We present two algorithms to compute a push plan for...
Mark de Berg, Dirk H. P. Gerrits
LATINCRYPT
2010
15 years 2 months ago
Broadcast Encryption with Multiple Trust Authorities
Abstract. In this paper we extend the notion of hierarchical identitybased encryption with wildcards (WIBE) from the domain of a single Trusted Authority (TA) to a setting with mul...
Kent D. Boklan, Alexander W. Dent, Christopher A. ...