Sciweavers

31 search results - page 5 / 7
» icics 2007
Sort
View
IJNSEC
2010
100views more  IJNSEC 2010»
13 years 5 months ago
On the Security of Yuan et al.'s Undeniable Signature Scheme
Undeniable signatures were proposed to limit the public verification property of ordinary digital signature. In fact, the verification of such signatures cannot be obtained withou...
Wei Zhao
ICIC
2007
Springer
14 years 4 months ago
A Hybrid Electromagnetism-Like Algorithm for Single Machine Scheduling Problem
Electromagnetism-like algorithm (EM) is a population-based meta-heuristic which has been proposed to solve continuous problems effectively. In this paper, we present a new meta-h...
Shih-Hsin Chen, Pei-Chann Chang, Chien-Lung Chan, ...
ICICS
2007
Springer
14 years 2 months ago
Time and Space Efficient Algorithms for Two-Party Authenticated Data Structures
Authentication is increasingly relevant to data management. Data is being outsourced to untrusted servers and clients want to securely update and query their data. For example, in ...
Charalampos Papamanthou, Roberto Tamassia
ICIC
2007
Springer
14 years 4 months ago
Evolutionary Ensemble for In Silico Prediction of Ames Test Mutagenicity
Driven by new regulations and animal welfare, the need to develop in silico models has increased recently as alternative approaches to safety assessment of chemicals without animal...
Huanhuan Chen, Xin Yao
ICIC
2007
Springer
14 years 4 months ago
Rough Set Theory of Shape Perception
Humans can easily recognize complex objects even if values of their attributes are imprecise and often inconsistent. It is not clear how the brain processes uncertain visual inform...
Andrzej W. Przybyszewski