Sciweavers

144 search results - page 27 / 29
» informaticalt 2006
Sort
View
INFORMATICALT
2006
177views more  INFORMATICALT 2006»
13 years 6 months ago
Cryptanalysis and Improvement of Practical Convertible Authenticated Encryption Schemes Using Self-Certified Public Keys
A convertible authenticated encryption scheme allows a specified recipient to recover and verify a message simultaneously. Moreover the recipient can prove the dishonesty of the se...
Zuhua Shao
INFORMATICALT
2006
164views more  INFORMATICALT 2006»
13 years 6 months ago
Usability Evaluation of a Virtual Museum Interface
The Augmented Representation of Cultural Objects (ARCO) system provides software and interface tools to museum curators to develop virtual museum exhibitions, as well as a virtual ...
Athanasis Karoulis, Stella Sylaiou, Martin White
INFORMATICALT
2006
116views more  INFORMATICALT 2006»
13 years 6 months ago
Cache-based Statistical Language Models of English and Highly Inflected Lithuanian
This paper investigates a variety of statistical cache-based language models built upon three corpora: English, Lithuanian, and Lithuanian base forms. The impact of the cache size,...
Airenas Vaiciunas, Gailius Raskinis
INFORMATICALT
2006
104views more  INFORMATICALT 2006»
13 years 6 months ago
Algorithms for Inner Magic and Inner Antimagic Labelings of Some Planar Graphs
In this work labeling of planar graphs is taken up which involves labeling the p vertices, the q edges and the f internal faces such that the weights of the faces form an arithmeti...
Auparajita Krishnaa, Manohar Singh Dulawat
INFORMATICALT
2006
100views more  INFORMATICALT 2006»
13 years 6 months ago
Optimal Agreement in a Scale-Free Network Environment
Generally, the task in a distributed system must achieve an agreement. It requires a set of processors to agree on a common value even if some components are corrupted. There are s...
Shu-Ching Wang, Kuo-Qin Yan, Mao-Lun Chiang