Sciweavers

8933 search results - page 1645 / 1787
» Usability over time
Sort
View
CCS
2005
ACM
15 years 10 months ago
A model and architecture for pseudo-random generation with applications to /dev/random
We present a formal model and a simple architecture for robust pseudorandom generation that ensures resilience in the face of an observer with partial knowledge/control of the gen...
Boaz Barak, Shai Halevi
CRYPTO
2005
Springer
97views Cryptology» more  CRYPTO 2005»
15 years 10 months ago
Generic Transformation for Scalable Broadcast Encryption Schemes
Broadcast encryption schemes allow a message sender to broadcast an encrypted data so that only legitimate receivers decrypt it. Because of the intrinsic nature of one-to-many comm...
Jung Yeon Hwang, Dong Hoon Lee, Jongin Lim
GECCO
2005
Springer
124views Optimization» more  GECCO 2005»
15 years 10 months ago
Evolving petri nets to represent metabolic pathways
Given concentrations of metabolites over a sequence of time steps, the metabolic pathway prediction problem seeks a set of reactions and rate constants for them that could yield t...
Jeremiah Nummela, Bryant A. Julstrom
ICAPR
2005
Springer
15 years 10 months ago
Mathematical Features for Recognizing Preference in Sub-saharan African Traditional Rhythm Timelines
The heart of an African rhythm is the timeline, a beat that cyclically repeats thoughout a piece, and is often performed with an iron bell that all performers can hear. Such rhythm...
Godfried T. Toussaint
ICNC
2005
Springer
15 years 10 months ago
Line-Based PCA and LDA Approaches for Face Recognition
Principal Component Analysis (PCA) and Linear Discriminant Analysis (LDA) techniques are important and well-developed area of image recognition and to date many linear discriminati...
Vo Dinh Minh Nhat, Sungyoung Lee
« Prev « First page 1645 / 1787 Last » Next »