Sciweavers

2165 search results - page 204 / 433
» cases 2005
Sort
View
IH
2005
Springer
15 years 10 months ago
Compulsion Resistant Anonymous Communications
We study the effect compulsion attacks, through which an adversary can request a decryption or key from an honest node, have on the security of mix based anonymous communication s...
George Danezis, Jolyon Clulow
IJCNLP
2005
Springer
15 years 10 months ago
Corpus-Based Analysis of Japanese Relative Clause Constructions
Japanese relative clause constructions (RCC’s) are defined as being the NP’s of structure ‘S NP’, noting the lack of a relative pronoun or any other explicit form of noun-...
Takeshi Abekawa, Manabu Okumura
IJCNLP
2005
Springer
15 years 10 months ago
Chunking Using Conditional Random Fields in Korean Texts
We present a method of chunking in Korean texts using conditional random fields (CRFs), a recently introduced probabilistic model for labeling and segmenting sequence of data. In a...
Yong-Hun Lee, Mi-Young Kim, Jong-Hyeok Lee
INDOCRYPT
2005
Springer
15 years 10 months ago
Cryptanalysis of the Quadratic Generator
Let p be a prime and let a and c be integers modulo p. The quadratic congruential generator (QCG) is a sequence (vn) of pseudorandom numbers defined by the relation vn+1 ≡ av2 n...
Domingo Gómez, Jaime Gutierrez, Álva...
ISAS
2005
Springer
15 years 10 months ago
Proof-Based System Engineering Using a Virtual System Model
Abstract. This paper provides an overview of Proof-Based System Engineering (PBSE), which aims at improving the current practice of developing computer-based systems. PBSE is of pa...
Martin Biely, Gérard Le Lann, Ulrich Schmid