Sciweavers

3082 search results - page 12 / 617
» its 2004
Sort
View
SAT
2004
Springer
106views Hardware» more  SAT 2004»
14 years 24 days ago
The Optimality of a Fast CNF Conversion and its Use with SAT
Despite the widespread use and study of Boolean satisfiability for a diverse range of problem domains, encoding of problems is usually given to general propositional logic with li...
Daniel Sheridan
NIPS
2004
13 years 8 months ago
Synchronization of neural networks by mutual learning and its application to cryptography
Two neural networks that are trained on their mutual output synchronize to an identical time dependant weight vector. This novel phenomenon can be used for creation of a secure cr...
Einat Klein, Rachel Mislovaty, Ido Kanter, Andreas...
IJNSEC
2006
66views more  IJNSEC 2006»
13 years 7 months ago
On the Security of Signature Scheme with Message Recovery and Its Application
In 2004, Sekhar proposed a new signature scheme with message recovery. Based on this signature scheme with message recovery, they also proposed a designated verifier signature sch...
Eun-Jun Yoon, Kee-Young Yoo
CVGIP
2004
98views more  CVGIP 2004»
13 years 7 months ago
Topological volume skeletonization and its application to transfer function design
Topological volume skeletonization is a novel approach for automating transfer function design in visualization by extracting the topological structure of a volume dataset. The sk...
Shigeo Takahashi, Yuriko Takeshima, Issei Fujishir...
ER
2004
Springer
125views Database» more  ER 2004»
14 years 26 days ago
Expressive Profile Specification and Its Semantics for a Web Monitoring System
Abstract. World wide web has gained a lot of prominence with respect to information retrieval and data delivery. With such a prolific growth, a user interested in a specific change...
Ajay Eppili, Jyoti Jacob, Alpa Sachde, Sharma Chak...