Sciweavers

1045 search results - page 63 / 209
» The Use of Exceptions
Sort
View
ASIACRYPT
2000
Springer
14 years 2 months ago
Security of Signed ElGamal Encryption
Assuming a cryptographically strong cyclic group G of prime order q and a random hash function H, we show that ElGamal encryption with an added Schnorr signature is secure against ...
Claus-Peter Schnorr, Markus Jakobsson
ECAI
2006
Springer
14 years 1 months ago
Compiling Possibilistic Knowledge Bases
Abstract. Possibilistic knowledge bases gather propositional formulas associated with degrees belonging to a linearly ordered scale. These degrees reflect certainty or priority, de...
Salem Benferhat, Henri Prade
APPINF
2003
13 years 11 months ago
The Force Model: Concept, Behavior, Interpretation
Most experiments in research on autonomous agents and mobile robots are performed either in simulation or on robots with static physical properties; evolvable hardware is hardly e...
Ralf Salomon
ICIP
2003
IEEE
14 years 11 months ago
Frame rate preferences in low bit rate video
A double stimulus subjective evaluation was performed to determine preferred frame rates at a fixed bit rate for low bit rate video. Stimuli consisted of eight reference color vid...
Gayatri Yadavalli, Mark Masry, Sheila S. Hemami
MUE
2008
IEEE
143views Multimedia» more  MUE 2008»
14 years 4 months ago
A Robust Watermark Scheme for Copyright Protection
In this paper, we propose a robust watermark technology that can be used to protect copyright. We enhance robustness of the watermark such that it can be used to protect the intel...
Chu-Hsing Lin, Jung-Chun Liu, Chih-Hsiong Shih, Ya...