Sciweavers

3921 search results - page 671 / 785
» Transforming Models with ATL
Sort
View
IMA
2005
Springer
126views Cryptology» more  IMA 2005»
14 years 3 months ago
Security Proof of Sakai-Kasahara's Identity-Based Encryption Scheme
Abstract. Identity-based encryption (IBE) is a special asymmetric encryption method where a public encryption key can be an arbitrary identifier and the corresponding private decr...
Liqun Chen, Zhaohui Cheng
ISMIR
2005
Springer
143views Music» more  ISMIR 2005»
14 years 3 months ago
A Robust Mid-Level Representation for Harmonic Content in Music Signals
When considering the problem of audio-to-audio matching, determining musical similarity using low-level features such as Fourier transforms and MFCCs is an extremely difficult ta...
Juan Pablo Bello, Jeremy Pickens
ISPEC
2005
Springer
14 years 3 months ago
Token-Controlled Public Key Encryption
Token-controlled public key encryption (TCPKE) schemes, introduced in [1], offer many possibilities of application in financial or legal scenarios. Roughly speaking, in a TCPKE s...
Joonsang Baek, Reihaneh Safavi-Naini, Willy Susilo
IVA
2005
Springer
14 years 3 months ago
An Objective Character Believability Evaluation Procedure for Multi-agent Story Generation Systems
Abstract. The ability to generate narrative is of importance to computer systems that wish to use story effectively for entertainment, training, or education. One of the focuses of...
Mark O. Riedl, R. Michael Young
IWDW
2005
Springer
14 years 3 months ago
Watermarking of 3D Irregular Meshes Based on Wavelet Multiresolution Analysis
In this paper, we propose a robust watermarking method for 3-D triangle surface meshes. Most previous methods based on the wavelet analysis can process only semi-regular meshes. Ou...
Min-Su Kim, Sébastien Valette, Ho-Youl Jung...