Sciweavers

118 search results - page 24 / 24
» Asymmetric Real Adaboost
Sort
View
IJISEC
2007
61views more  IJISEC 2007»
13 years 10 months ago
Identity-based key agreement protocols from pairings
In recent years, a large number of identity-based key agreement protocols from pairings have been proposed. Some of them are elegant and practical. However, the security of this ty...
Liqun Chen, Zhaohui Cheng, Nigel P. Smart
TPDS
2008
105views more  TPDS 2008»
13 years 10 months ago
peerTalk: A Peer-to-Peer Multiparty Voice-over-IP System
Multiparty voice-over-IP (MVoIP) services allow a group of people to freely communicate with each other via the Internet, which have many important applications such as online gami...
Xiaohui Gu, Zhen Wen, Philip S. Yu, Zon-Yin Shae
PKAW
2010
13 years 9 months ago
Finding Relation between PageRank and Voter Model
Abstract. Estimating influence of a node is an important problem in social network analyses. We address this problem in a particular class of model for opinion propagation in whic...
Takayasu Fushimi, Kazumi Saito, Masahiro Kimura, H...