Sciweavers

INFORMATICALT
2006
101views more  INFORMATICALT 2006»
13 years 3 months ago
Determination of Stress Strain State Components of Butt Welded Joint with Mild Interlayer Subjected to Elasto-Plastic Tension
Abstract. Determination of stress strain state components of butt welded joint with a mild interlayer at elasto-plastic tension is presented in this paper. Function of normal trans...
Algis Brazenas, Dainius Vaiciulis, Vytautas Kleiza
INFORMATICALT
2006
89views more  INFORMATICALT 2006»
13 years 3 months ago
Provably Secure Convertible User Designating Confirmer Partially Blind Signatures
Zhenjie Huang, Kefei Chen, Yumin Wang
INFORMATICALT
2006
177views more  INFORMATICALT 2006»
13 years 3 months ago
Cryptanalysis and Improvement of Practical Convertible Authenticated Encryption Schemes Using Self-Certified Public Keys
A convertible authenticated encryption scheme allows a specified recipient to recover and verify a message simultaneously. Moreover the recipient can prove the dishonesty of the se...
Zuhua Shao
INFORMATICALT
2006
116views more  INFORMATICALT 2006»
13 years 3 months ago
An Electronic Cash System Based on Group Blind Signatures
One important requirement of electronic cash systems is the anonymity of customers. Unconditional anonymity is also very well suited to support criminals in blackmailing. Maitland ...
Constantin Popescu
INFORMATICALT
2006
110views more  INFORMATICALT 2006»
13 years 3 months ago
Iterated Tabu Search for the Unconstrained Binary Quadratic Optimization Problem
Given a set of objects with profits (any, even negative, numbers) assigned not only to separate objects but also to pairs of them, the unconstrained binary quadratic optimization p...
Gintaras Palubeckis
INFORMATICALT
2006
90views more  INFORMATICALT 2006»
13 years 3 months ago
Velocity Distribution Profile for Robot Arm Motion Using Rational Frenet-Serret Curves
Abstract. The aim of this paper is to demonstrate that the techniques of Computer Aided Geometric Design such as spatial rational curves and surfaces could be applied to Kinematics...
Reza Ravani, Ali Meghdari
INFORMATICALT
2006
105views more  INFORMATICALT 2006»
13 years 3 months ago
Adaptive Chosen Ciphertext Secure Threshold Key Escrow Scheme from Pairing
This paper proposes a threshold key escrow scheme from pairing. It tolerates the passive adversary to access any internal data of corrupted key escrow agents and the active adversa...
Yu Long, Kefei Chen, Shengli Liu
INFORMATICALT
2006
96views more  INFORMATICALT 2006»
13 years 3 months ago
Evaluation of Ranking Accuracy in Multi-Criteria Decisions
The paper analyses the problem of ranking accuracy in multiple criteria decision-making (MCDM) methods. The methodology for measuring the accuracy of determining the relative signi...
Edmundas Kazimieras Zavadskas, Algimantas Zakarevi...
INFORMATICALT
2006
116views more  INFORMATICALT 2006»
13 years 3 months ago
Cache-based Statistical Language Models of English and Highly Inflected Lithuanian
This paper investigates a variety of statistical cache-based language models built upon three corpora: English, Lithuanian, and Lithuanian base forms. The impact of the cache size,...
Airenas Vaiciunas, Gailius Raskinis
INFORMATICALT
2006
65views more  INFORMATICALT 2006»
13 years 3 months ago
Iterative Estimation Algorithm of Autoregressive Parameters
This paper presents an iterative autoregressive system parameter estimation algorithm in the presence of white observation noise. The algorithm is based on the parameter estimation...
Kazys Kazlauskas, Jaunius Kazlauskas