Sciweavers

2208 search results - page 92 / 442
» On Issues of Instance Selection
Sort
View
AES
2000
Springer
105views Cryptology» more  AES 2000»
14 years 2 months ago
The Effects of Multiple Algorithms in the Advanced Encryption Standard
This paper presents a discussion of the issues relating to the selection of encryption algorithms in practical situations. An AES standard which recommends multiple algorithms in ...
Ian Harvey
PAA
2008
13 years 10 months ago
Fusion of textural statistics using a similarity measure: application to texture recognition and segmentation
Abstract Features computed as statistics (e.g. histograms) of local filter responses have been reported as the most powerful descriptors for texture classification and segmentation...
Imen Karoui, Ronan Fablet, Jean-Marc Boucher, Wojc...
COMMA
2008
13 years 11 months ago
Arguments from Experience: The PADUA Protocol
In this paper we describe PADUA, a protocol designed to enable agents to debate an issue drawing arguments not from a knowledge base of facts, rules and priorities but directly fro...
Maya Wardeh, Trevor J. M. Bench-Capon, Frans Coene...
PKC
2007
Springer
144views Cryptology» more  PKC 2007»
14 years 4 months ago
Traceable Ring Signature
Abstract. The ring signature allows a signer to leak secrets anonymously, without the risk of identity escrow. At the same time, the ring signature provides great flexibility: No ...
Eiichiro Fujisaki, Koutarou Suzuki
WCNC
2008
IEEE
14 years 4 months ago
Selective Relaying in Cooperative OFDM Systems: Two-Hop Random Network
— In this paper, we investigate two selective relaying schemes in cooperative OFDM systems. Selective OFDMA relaying, where the relay selection is performed in a per-subcarrier m...
Bo Gui, Lin Dai, Leonard J. Cimini Jr.