Sciweavers

149 search results - page 20 / 30
» What will they say
Sort
View
EUC
2006
Springer
13 years 11 months ago
A Scalable and Untraceable Authentication Protocol for RFID
RFID(Radio Frequency Identification) is recently becoming popular, promising and widespread. In contrast, RFID tags can bring about traceability that causes user privacy and reduce...
Youngjoon Seo, Hyunrok Lee, Kwangjo Kim
PKC
2000
Springer
120views Cryptology» more  PKC 2000»
13 years 11 months ago
Optimally Efficient Accountable Time-Stamping
Abstract. Efficient secure time-stamping schemes employ a 2-level approach in which the time-stamping service operates in rounds. We say that a time-stamping service is accountable...
Ahto Buldas, Helger Lipmaa, Berry Schoenmakers
INTERACT
2003
13 years 9 months ago
Vision-Speech System Becoming Efficient and Friendly through Experience
: This paper presents a vision-speech system for service robots that can learn the user’s customs and objects fixed in the environment while helping the user, and can perform the...
Yoshinori Kuno, Mitsutoshi Yoshizaki, Akio Nakamur...
COMBINATORICS
1999
90views more  COMBINATORICS 1999»
13 years 7 months ago
New Bounds for Codes Identifying Vertices in Graphs
Let G = (V, E) be an undirected graph. Let C be a subset of vertices that we shall call a code. For any vertex v V , the neighbouring set N(v, C) is the set of vertices of C at d...
Gérard D. Cohen, Iiro S. Honkala, Antoine L...
CICLING
2010
Springer
13 years 2 months ago
An Empirical Study on the Feature's Type Effect on the Automatic Classification of Arabic Documents
The Arabic language is a highly flexional and morphologically very rich language. It presents serious challenges to the automatic classification of documents, one of which is deter...
Saeed Raheel, Joseph Dichy