Sciweavers

INFORMATICALT
2007
127views more  INFORMATICALT 2007»
13 years 4 months ago
Composition of Loop Modules in the Structural Blanks Approach to Programming with Recurrences: A Task of Synthesis of Nested Loo
The paper presents, first, the Structural Blanks (SB) approach, then a method to compose loop programs. SB is an approach for expressing computations based on recurrence relations...
Vytautas Cyras
INFORMATICALT
2007
167views more  INFORMATICALT 2007»
13 years 4 months ago
Ultrasound Quantitative Evaluation of Human Eye Cataract
Abstract. A technique to improve an eye cataract early detection and quantitative evaluation of maturity using ultrasound was investigated. A broadband coherent signal, backscatter...
Alvydas Paunksnis, Skaidra Kurapkiene, Audris Maci...
INFORMATICALT
2007
104views more  INFORMATICALT 2007»
13 years 4 months ago
Key Agreement Protocol (KAP) Using Conjugacy and Discrete Logarithm Problems in Group Representation Level
The key agreement protocol based on infinite non-commutative group presentation and representation levels is proposed. Two simultaneous problems in group representation level are ...
Eligijus Sakalauskas, Povilas Tvarijonas, Andrius ...
INFORMATICALT
2007
43views more  INFORMATICALT 2007»
13 years 4 months ago
Functional Test Generation Based on Combined Random and Deterministic Search Methods
Abstract. The aim of this paper is to explore some features of the functional test generation problem, and on the basis of the gained experience, to propose a practical method for ...
Eduardas Bareisa, Vacius Jusas, Kestutis Motiejuna...
INFORMATICALT
2007
109views more  INFORMATICALT 2007»
13 years 4 months ago
A Secure YS-Like User Authentication Scheme
Abstract. Recently, there are several articles proposed based on Yang and Shieh’s password authentication schemes (YS for short) with the following features: (1) A user can choos...
Tzungher Chen, Gwoboa Horng, Ke-Chiang Wu
INFORMATICALT
2007
100views more  INFORMATICALT 2007»
13 years 4 months ago
On the Proxy-Protected Property of Chen et al.'s Proxy Multisignature Schemes
Recently, Chen, Chung, and Huang proposed a traceable proxy multisignature scheme based on the elliptic curve cryptosystem. However, this paper shows that the original signers can ...
Pei-Hui Huang, Hsiang-An Wen, Chih-Hung Wang, Tzon...
INFORMATICALT
2007
112views more  INFORMATICALT 2007»
13 years 4 months ago
A New ID-Based Deniable Authentication Protocol
Abstract. Deniable authenticated protocol is a new cryptographic authentication protocol that enables a designated receiver to identify the source of a given message without being ...
Rongxing Lu, Zhenfu Cao, Shengbao Wang, Haiyong Ba...
INFORMATICALT
2007
111views more  INFORMATICALT 2007»
13 years 4 months ago
Oblique Support Vector Machines
In this paper we propose a modified framework of support vector machines, called Oblique Support Vector Machines(OSVMs), to improve the capability of classification. The principl...
Chih-Chia Yao, Pao-Ta Yu
INFORMATICALT
2007
88views more  INFORMATICALT 2007»
13 years 4 months ago
The Extension of the Van Der Pauw Method to Anisotropic Media
Abstract. The method for calculating the specific conductivity tensor of an anisotropically conductive medium, proposed in this paper, distinguishes itself by the simplicity of ph...
Jonas Kleiza, Mifodijus Sapagovas, Vytautas Kleiza
INFORMATICALT
2007
81views more  INFORMATICALT 2007»
13 years 4 months ago
Security Flaw in Simple Generalized Group-Oriented Cryptosystem Using ElGamal Cryptosystem
A generalized group-oriented cryptosystem (GGOC) based on ElGamal cryptosystem was proposed by Yang et al. in 2003. This study shows that if the authorized decryption sets of users...
Chuan-Ming Li, Tzonelih Hwang, Narn-Yih Lee