Sciweavers

1282 search results - page 193 / 257
» Signing on signing off
Sort
View
ISPEC
2005
Springer
14 years 3 months ago
On the Security of Some Nonrepudiable Threshold Proxy Signature Schemes
A (t, n) threshold proxy signature scheme enables an original signer to delegate the signature authority to a proxy group of n member such that t or more than t proxy signers can ...
Zuowen Tan, Zhuojun Liu, Wang Mingsheng
KES
2005
Springer
14 years 3 months ago
Relative Magnitude of Gaussian Curvature from Shading Images Using Neural Network
Abstract. A new approach is proposed to recover the relative magnitude of Gaussian curvature from three shading images using neural network. Under the assumption that the test obje...
Yuji Iwahori, Shinji Fukui, Chie Fujitani, Yoshino...
MATA
2005
Springer
169views Communications» more  MATA 2005»
14 years 3 months ago
Facilitating Context-Awareness Through Hardware Personalization Devices: The Simplicity Device
Abstract. The paper presents the specification, development and initial performance evaluation of the Simplicity Device (SD), which is one of the key components of the SIMPLICITY A...
J. Papanis, Sofia Kapellaki, Eleftherios Koutsolou...
SARA
2005
Springer
14 years 3 months ago
Feature-Discovering Approximate Value Iteration Methods
Sets of features in Markov decision processes can play a critical role ximately representing value and in abstracting the state space. Selection of features is crucial to the succe...
Jia-Hong Wu, Robert Givan
WAIM
2005
Springer
14 years 3 months ago
Integrative Security Management for Web-Based Enterprise Applications
In enterprise environment, security becomes increasingly important and costly. Enterprises are struggling to protect the increasing amount of disparate resources. Simple patchwork ...
Chen Zhao, Yang Chen, Dawei Xu, NuerMaimaiti Heili...