Sciweavers

40 search results - page 2 / 8
» informaticalt 2010
Sort
View
INFORMATICALT
2010
94views more  INFORMATICALT 2010»
13 years 7 months ago
Statistical Classification of Scientific Publications
The problem of automatic classification of scientific texts is considered. Methods based on statistical analysis of probabilistic distributions of scientific terms in texts are dis...
Vaidas Balys, Rimantas Rudzkis
INFORMATICALT
2010
103views more  INFORMATICALT 2010»
13 years 7 months ago
Delegatability of an Identity Based Strong Designated Verifier Signature Scheme
In 2007, Kancharla et al. proposed an identity-based strong designated verifier signature (IBSDVS) scheme based on bilinear pairings, and claimed it unforgeable and non-delegatable...
Xun Sun, Jianhua Li, Hu Yin, Gongliang Chen
INFORMATICALT
2010
99views more  INFORMATICALT 2010»
13 years 8 months ago
Security Analysis of Asymmetric Cipher Protocol Based on Matrix Decomposition Problem
The asymmetric cipher protocol, based on decomposition problem in matrix semiring M over semiring of natural numbers N is presented. The security of presented cipher protocol is ba...
Andrius Raulynaitis, Eligijus Sakalauskas, Saulius...
INFORMATICALT
2010
169views more  INFORMATICALT 2010»
13 years 8 months ago
Parameters Estimation in Modelling of Gas-Gap in RBMK Type Reactor Using Bayesian Approach
Abstract. This study presents developed algorithm for assessment and updating estimates of parameters in the mathematical models of non-stationary processes (for instance, system a...
Inga Zutautaite-Seputiene, Juozas Augutis, Laimuti...
INFORMATICALT
2010
148views more  INFORMATICALT 2010»
13 years 7 months ago
A Novel Combinatorial Public Key Cryptosystem
Combinatorial problems serve as an important resource for developing practical public key cryptosystems and several combinatorial cryptosystems have been proposed in the cryptograp...
Baocang Wang, Yupu Hu