Sciweavers

40 search results - page 5 / 8
» informaticalt 2010
Sort
View
INFORMATICALT
2010
126views more  INFORMATICALT 2010»
13 years 6 months ago
An Entire Chaos-Based Biometric Remote User Authentication Scheme on Tokens Without Using Password
This paper presents an entire chaos-based biometric remote user authentication scheme on tokens without using passwords. The proposed scheme is based on the chaotic hash function a...
Eun-Jun Yoon, Kee-Young Yoo
INFORMATICALT
2010
118views more  INFORMATICALT 2010»
13 years 6 months ago
Facilitating Ontology Development with Continuous Evaluation
In this paper we propose facilitating ontology development by constant evaluation of steps in the process of ontology development. Existing methodologies for ontology development a...
Dejan Lavbic, Marjan Krisper
INFORMATICALT
2010
103views more  INFORMATICALT 2010»
13 years 4 months ago
Multistage K-Means Clustering for Scenario Tree Construction
Abstract. In stochastic programming and decision analysis, an important issue consists in the approximate representation of the multidimensional stochastic underlying process in th...
Kristina Sutiene, Dalius Makackas, Henrikas Pranev...
INFORMATICALT
2010
112views more  INFORMATICALT 2010»
13 years 6 months ago
Recursive Identification of Systems with Noninvertible Output Nonlinearities
Abstract. The paper deals with the recursive identification of dynamic systems having noninvertible output characteristics, which can be represented by the Wiener model. A special ...
Jozef Vörös
INFORMATICALT
2010
132views more  INFORMATICALT 2010»
13 years 6 months ago
An Improved Securer and Efficient Nonce-Based Authentication Scheme with Token-Update
In this paper, we propose a mutual authentication scheme using nonce variable instead of Mac address and accompanying with token updates to improve the functionality. Lee et al. (2...
Chiu-Hsiung Liao, Ching-Te Wang, Hon-Chan Chen