Sciweavers

1047 search results - page 155 / 210
» Searching Without a Heuristic: Efficient Use of Abstraction
Sort
View
CISC
2007
Springer
155views Cryptology» more  CISC 2007»
14 years 1 days ago
ECDSA-Verifiable Signcryption Scheme with Signature Verification on the Signcrypted Message
Abstract. In this paper, we propose a signcryption scheme which provides all the following properties at the same time. (1) forward security: the private key of a sender does not h...
Raylin Tso, Takeshi Okamoto, Eiji Okamoto
ENTCS
2010
84views more  ENTCS 2010»
13 years 5 months ago
Syntactic Language Extension via an Algebra of Languages and Transformations
We propose an algebra of languages and transformations as a means for extending s syntactically. The algebra provides a layer of high-level abstractions built on top of languages ...
Jacob Andersen, Claus Brabrand
ANNPR
2008
Springer
13 years 10 months ago
Supervised Incremental Learning with the Fuzzy ARTMAP Neural Network
Abstract. Automatic pattern classifiers that allow for on-line incremental learning can adapt internal class models efficiently in response to new information without retraining fr...
Jean-François Connolly, Eric Granger, Rober...
KDD
2009
ACM
188views Data Mining» more  KDD 2009»
14 years 8 months ago
Mining discrete patterns via binary matrix factorization
Mining discrete patterns in binary data is important for subsampling, compression, and clustering. We consider rankone binary matrix approximations that identify the dominant patt...
Bao-Hong Shen, Shuiwang Ji, Jieping Ye
CORR
2002
Springer
122views Education» more  CORR 2002»
13 years 8 months ago
Fair Stateless Aggregate Traffic Marking using Active Queue Management Techniques
Abstract--In heterogeneous networks such as today's Internet, the differentiated services architecture promises to provide QoS guarantees through scalable service differentiat...
Abhimanyu Das, Debojyoti Dutta, Ahmed Helmy