Sciweavers

CORR
2010
Springer
142views Education» more  CORR 2010»
13 years 11 months ago
Graph Zeta Function in the Bethe Free Energy and Loopy Belief Propagation
We propose a new approach to the analysis of Loopy Belief Propagation (LBP) by establishing a formula that connects the Hessian of the Bethe free energy with the edge zeta functio...
Yusuke Watanabe, Kenji Fukumizu
CORR
2010
Springer
97views Education» more  CORR 2010»
13 years 11 months ago
Cryptanalysis of an Efficient Signcryption Scheme with Forward Secrecy Based on Elliptic Curve
The signcryption is a relatively new cryptographic technique that is supposed to fulfill the functionalities of encryption and digital signature in a single logical step. Several ...
Mohsen Toorani, Ali Asghar Beheshti Shirazi
CORR
2010
Springer
89views Education» more  CORR 2010»
13 years 11 months ago
LPKI - A Lightweight Public Key Infrastructure for the Mobile Environments
The non-repudiation as an essential requirement of many applications can be provided by the asymmetric key model. With the evolution of new applications such as mobile commerce, it...
Mohsen Toorani, Ali Asghar Beheshti Shirazi
CORR
2010
Springer
144views Education» more  CORR 2010»
13 years 11 months ago
Asymptotically Stable Walking of a Five-Link Underactuated 3D Bipedal Robot
This paper presents three feedback controllers that achieve an asymptotically stable, periodic, and fast walking gait for a 3D bipedal robot consisting of a torso, revolute knees, ...
Christine Chevallereau, Jessy W. Grizzle, Ching-Lo...
CORR
2010
Springer
42views Education» more  CORR 2010»
13 years 11 months ago
Noisy Network Coding
Sung Hoon Lim, Young-Han Kim, Abbas El Gamal, Sae-...
CORR
2010
Springer
117views Education» more  CORR 2010»
13 years 11 months ago
SMEmail - A New Protocol for the Secure E-mail in Mobile Environments
The electronic mail plays an unavoidable role in the humankind communications. With the great interest for the connection via mobile platforms, and the growing number of vulnerabil...
Mohsen Toorani
CORR
2010
Springer
66views Education» more  CORR 2010»
13 years 11 months ago
Solutions to the GSM Security Weaknesses
Recently, the mobile industry has experienced an extreme increment in number of its users. The GSM network with the greatest worldwide number of users succumbs to several security...
Mohsen Toorani, Ali Asghar Beheshti Shirazi
CORR
2010
Springer
71views Education» more  CORR 2010»
13 years 11 months ago
The relational model is injective for Multiplicative Exponential Linear Logic (without weakenings)
We show that for Multiplicative Exponential Linear Logic (without weakenings) the syntactical equivalence relation on proofs induced by cut-elimination coincides with the semantic ...
Daniel de Carvalho, Lorenzo Tortora de Falco
CORR
2010
Springer
67views Education» more  CORR 2010»
13 years 11 months ago
Using ATL to define advanced and flexible constraint model transformations
Abstract. Transforming constraint models is an important task in recent constraint programming systems. User-understandable models are defined during the modeling phase but rewriti...
Raphaël Chenouard, Laurent Granvilliers, Rica...