Sciweavers

525 search results - page 55 / 105
» Using Checkable Types in Automatic Protocol Analysis
Sort
View
115
Voted
SCN
2010
Springer
145views Communications» more  SCN 2010»
15 years 17 days ago
Distributed Private-Key Generators for Identity-Based Cryptography
An identity-based encryption (IBE) scheme can greatly reduce the complexity of sending encrypted messages. However, an IBE scheme necessarily requires a private-key generator (PKG)...
Aniket Kate, Ian Goldberg
FSMNLP
2005
Springer
15 years 7 months ago
German Compound Analysis with wfsc
Compounding is a very productive process in German to form complex nouns and adjectives which represent about 7% of the words of a newspaper text. Unlike English, German compounds ...
Anne Schiller
134
Voted
RTAS
2008
IEEE
15 years 8 months ago
Using Trace Scratchpads to Reduce Execution Times in Predictable Real-Time Architectures
Instruction scratchpads have been previously suggested as a way to reduce the worst case execution time (WCET) of hard real-time programs without introducing the analysis issues p...
Jack Whitham, Neil C. Audsley
KES
2008
Springer
15 years 2 months ago
Epileptic Seizure Classification Using Neural Networks with 14 Features
Epilepsy is one of the most frequent neurological disorders. The main method used in epilepsy diagnosis is electroencephalogram (EEG) signal analysis. However this method requires ...
Rui P. Costa, Pedro Oliveira, Guilherme Rodrigues,...
112
Voted
ICDAR
2003
IEEE
15 years 7 months ago
Text-indicated Writer Verification Using Hidden Markov Models
We propose an HMM-based text-indicated writer verification method, which is based on a challenge and response type of authentication process. In this method, a different text incl...
Yasushi Yamazaki, Tsuyoshi Nagao, Naohisa Komatsu