Sciweavers

12459 search results - page 141 / 2492
» cans 2006
Sort
View
IJMMS
2006
90views more  IJMMS 2006»
15 years 4 months ago
Evaluating mass knowledge acquisition using the ALICE chatterbot: The AZ-ALICE dialog system
In this paper, we evaluate mass knowledge acquisition using modified ALICE chatterbots. In particular we investigate the potential of allowing subjects to modify chatterbot respon...
Robert P. Schumaker, Ying Liu, Mark Ginsburg, Hsin...
IJNSEC
2006
107views more  IJNSEC 2006»
15 years 4 months ago
ID-based Signcryption Scheme with (t, n) Shared Unsigncryption
An identity-based signcryption scheme with (t, n) shared unsigncryption is proposed, which is the integration of the signcryption scheme, the (t, n) threshold scheme and zero know...
Fagen Li, Xiangjun Xin, Yupu Hu
IJNSEC
2006
115views more  IJNSEC 2006»
15 years 4 months ago
Reversible Watermarking: Current Status and Key Issues
Over the past few years a number of research papers about reversible watermarks has been produced. Reversible watermarking is a novel category of watermarking schemes. It not only...
Jen-Bang Feng, Iuon-Chang Lin, Chwei-Shyong Tsai, ...
IJNSEC
2006
112views more  IJNSEC 2006»
15 years 4 months ago
An Access Control System with Time-constraint Using Support Vector Machines
Access control is an important issue in information security. It is a necessary mechanism for protecting data in a computer system. In this paper, we apply support vector machines...
Chin-Chen Chang, Iuon-Chang Lin, Chia-Te Liao
IJON
2006
54views more  IJON 2006»
15 years 4 months ago
Self-organization of hierarchical visual maps with feedback connections
Visual areas in primates are known to have reciprocal connections. While the feedforward bottom-up processing of visual information has been studied extensively for decades, littl...
Yiu-Fai Sit, Risto Miikkulainen