Sciweavers

1045 search results - page 63 / 209
» The Use of Exceptions
Sort
View
132
Voted
ASIACRYPT
2000
Springer
15 years 7 months ago
Security of Signed ElGamal Encryption
Assuming a cryptographically strong cyclic group G of prime order q and a random hash function H, we show that ElGamal encryption with an added Schnorr signature is secure against ...
Claus-Peter Schnorr, Markus Jakobsson
114
Voted
ECAI
2006
Springer
15 years 6 months ago
Compiling Possibilistic Knowledge Bases
Abstract. Possibilistic knowledge bases gather propositional formulas associated with degrees belonging to a linearly ordered scale. These degrees reflect certainty or priority, de...
Salem Benferhat, Henri Prade
123
Voted
APPINF
2003
15 years 4 months ago
The Force Model: Concept, Behavior, Interpretation
Most experiments in research on autonomous agents and mobile robots are performed either in simulation or on robots with static physical properties; evolvable hardware is hardly e...
Ralf Salomon
121
Voted
ICIP
2003
IEEE
16 years 4 months ago
Frame rate preferences in low bit rate video
A double stimulus subjective evaluation was performed to determine preferred frame rates at a fixed bit rate for low bit rate video. Stimuli consisted of eight reference color vid...
Gayatri Yadavalli, Mark Masry, Sheila S. Hemami
112
Voted
MUE
2008
IEEE
143views Multimedia» more  MUE 2008»
15 years 9 months ago
A Robust Watermark Scheme for Copyright Protection
In this paper, we propose a robust watermark technology that can be used to protect copyright. We enhance robustness of the watermark such that it can be used to protect the intel...
Chu-Hsing Lin, Jung-Chun Liu, Chih-Hsiong Shih, Ya...