Sciweavers

562 search results - page 44 / 113
» Third quarter 2008
Sort
View
IJRR
2008
98views more  IJRR 2008»
13 years 10 months ago
Automatic Configuration Recognition Methods in Modular Robots
Recognizing useful modular robot configurations composed of hundreds of modules is a significant challenge. Matching a new modular robot configuration to a library of known configu...
Michael Park, Sachin Chitta, Alex Teichman, Mark Y...
INFORMATICALT
2008
105views more  INFORMATICALT 2008»
13 years 10 months ago
Public Key Authentication Schemes for Local Area Networks
The invention of public-key cryptography makes many new network applications, such as electronic commerce (CE), possible. However, the widely used Internet is open and unprotected....
Tzungher Chen, Gwoboa Horng, Chuan-Sheng Yang
IPM
2008
88views more  IPM 2008»
13 years 10 months ago
Remembering William Goffman: Mathematical information science pioneer
This paper reviews the career and legacy of William (Bill) Goffman, who served as a researcher, Professor, Dean and Emeritus at Case Western Reserve University, Cleveland, Ohio, f...
Glynn Harmon
IPM
2008
93views more  IPM 2008»
13 years 10 months ago
A new robust relevance model in the language model framework
ct 8 In this paper, a new robust relevance model is proposed that can be applied to both pseudo and true relevance feedback 9 in the language-modeling framework for document retrie...
Xiaoyan Li
ISCI
2008
86views more  ISCI 2008»
13 years 10 months ago
New (t, n) threshold directed signature scheme with provable security
Directed signature scheme allows only a designated verifier to check the validity of the signature issued to him; and at the time of trouble or if necessary, any third party can v...
Rongxing Lu, Xiaodong Lin, Zhenfu Cao, Jun Shao, X...