Sciweavers

6137 search results - page 1007 / 1228
» Securing Collaborative Applications
Sort
View
IJNSEC
2007
128views more  IJNSEC 2007»
15 years 2 months ago
LFSR-based Signatures with Message Recovery
In order to reduce key sizes and bandwidth, several LFSRbased (linear feedback shift register) public key cryptosystems and signature schemes have been proposed. Digital signature...
Xiangxue Li, Dong Zheng, Kefei Chen
TASE
2008
IEEE
15 years 2 months ago
Perspectives in Probabilistic Verification
Soon after the birth of the flourishing research area of model checking in the early eighties, researchers started to apply this technique to finite automata equipped with probabi...
Joost-Pieter Katoen
TCSV
2008
189views more  TCSV 2008»
15 years 2 months ago
Machine Recognition of Human Activities: A Survey
The past decade has witnessed a rapid proliferation of video cameras in all walks of life and has resulted in a tremendous explosion of video content. Several applications such as ...
Pavan K. Turaga, Rama Chellappa, V. S. Subrahmania...
JLP
2007
74views more  JLP 2007»
15 years 2 months ago
Linearity and bisimulation
Exploiting linear type structure, we introduce a new theory bisimilarity for the π-calculus in which we abstract away not only τ-actions but also non-τ actions which do not aff...
Nobuko Yoshida, Kohei Honda, Martin Berger
JNW
2007
132views more  JNW 2007»
15 years 2 months ago
Genetic Algorithm for Hierarchical Wireless Sensor Networks
— Large scale wireless sensor networks (WSNs) can be used for various pervasive and ubiquitous applications such as security, health-care, industry automation, agriculture, envir...
Sajid Hussain, Abdul Wasey Matin, Obidul Islam
« Prev « First page 1007 / 1228 Last » Next »