Sciweavers

2642 search results - page 22 / 529
» The development of Chez Scheme
Sort
View
IJNSEC
2007
164views more  IJNSEC 2007»
13 years 9 months ago
A Biometric Identity Based Signature Scheme
We describe an identity based signature scheme that uses biometric information to construct the public key. Such a scheme would be beneficial in many repudiation situations for e...
Andrew Burnett, Fergus Byrne, Tom Dowling, Adam Du...
AAMAS
2002
Springer
13 years 9 months ago
A Scheduling Scheme for Controlling Allocation of CPU Resources for Mobile Programs
There is considerable interest in developing runtime infrastructures for programs that can migrate from one host to another. Mobile programs are appealing because they support eff...
Manoj Lal, Raju Pandey
PRL
2002
94views more  PRL 2002»
13 years 9 months ago
A hierarchical tag-graph search scheme with layered grammar rules for spontaneous speech understanding
It has always been difficult for language understanding systems to handle spontaneous speech with satisfactory robustness, primarily due to such problems as the fragments, disflue...
Bor-shen Lin, Berlin Chen, Hsin-Min Wang, Lin-Shan...
EEE
2004
IEEE
14 years 1 months ago
An Encoding Scheme for Indexing XML Data
E-Services are becoming as promising technology for the effective automation of application integration across Web. They build upon XML, as data format for exchanging messages bet...
Wansong Zhang, Daxin Liu, Jian Li
TPDS
2008
115views more  TPDS 2008»
13 years 9 months ago
An Adaptive GTS Allocation Scheme for IEEE 802.15.4
IEEE 802.15.4 is a new standard uniquely designed for low-rate wireless personal area networks. It targets ultralow complexity, cost, and power for low-rate wireless connectivity a...
Yu-Kai Huang, Ai-Chun Pang, Hui-Nien Hung