Sciweavers

1282 search results - page 156 / 257
» Signing on signing off
Sort
View
IJNSEC
2007
128views more  IJNSEC 2007»
13 years 10 months ago
LFSR-based Signatures with Message Recovery
In order to reduce key sizes and bandwidth, several LFSRbased (linear feedback shift register) public key cryptosystems and signature schemes have been proposed. Digital signature...
Xiangxue Li, Dong Zheng, Kefei Chen
TITS
2008
189views more  TITS 2008»
13 years 10 months ago
Robust Road Modeling and Tracking Using Condensation
In this paper, we present a robust road detection and tracking method based on a condensation particle filter for real-time video-based navigation applications. The image is divide...
Yan Wang, Li Bai, Michael C. Fairhurst
JCB
2007
99views more  JCB 2007»
13 years 10 months ago
Duplication and Inversion History of a Tandemly Repeated Genes Family
Given a phylogenetic tree for a family of tandemly repeated genes and their signed order on the chromosome, we aim to find the minimum number of inversions compatible with an evo...
Mathieu Lajoie, Denis Bertrand, Nadia El-Mabrouk, ...
CE
2005
84views more  CE 2005»
13 years 10 months ago
Virtual collaborative learning environments for music: networked drumsteps
This paper focuses on technologies that enable meaningful, constructionist interaction in collaborative music environments. In particular, it describes the design and implementati...
Conor McCarthy, James Bligh, Kevin Jennings, Brend...
JNCA
2007
179views more  JNCA 2007»
13 years 10 months ago
Modeling intrusion detection system using hybrid intelligent systems
The process of monitoring the events occurring in a computer system or network and analyzing them for sign of intrusions is known as intrusion detection system (IDS). This paper p...
Sandhya Peddabachigari, Ajith Abraham, Crina Grosa...