Sciweavers

ISW
2009
Springer
14 years 25 min ago
Efficient Conditional Proxy Re-encryption with Chosen-Ciphertext Security
Jian Weng, Yanjiang Yang, Qiang Tang, Robert H. De...
ISW
2009
Springer
14 years 25 min ago
MAC Precomputation with Applications to Secure Memory
We present ShMAC (Shallow MAC), a fixed input length message authentication code that performs most of the computation prior to the availability of the message. Specifically, Sh...
Juan A. Garay, Vladimir Kolesnikov, Rae McLellan
ISW
2009
Springer
14 years 25 min ago
On the Security of Identity Based Ring Signcryption Schemes
S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Ra...
ISCIS
2009
Springer
14 years 2 hour ago
Predicting future object states using learned affordances
Abstract—The notion of affordances was proposed by J.J. Gibson, to refer to the action possibilities offered to the organism by its environment. In a previous formalization, affo...
Emre Ugur, Erol Sahin, Erhan Oztop
ISCIS
2009
Springer
14 years 2 hour ago
Towards linking affordances with mirror/canonical neurons
— The notion of affordances is often directly linked with studies on mirror and canonical neurons as well as studies that try to relate language. In our previous work, we had dev...
Erol Sahin, Selim T. Erdogan
ISCIS
2009
Springer
14 years 2 hour ago
Channel assignment problem in cellular networks: A reactive tabu search approach
—The channel assignment problem (CAP) in cellular networks is concerned with the allocation and reuse of the frequency spectrum to the base stations in such a way that both the i...
Didem Gözüpek, Gaye Genç, Cem Ers...
ISCIS
2009
Springer
14 years 2 hour ago
Halftoning soft cores for low-cost digital displays
This paper presents hardware design of a family of soft cores that improve image quality on low cost digital displaying devices with limited color palette. The twoelement half-toni...
Muhammet Erkoc, Arda Yurdakul
ISCIS
2009
Springer
14 years 2 hour ago
Using 3D contours and their relations for cognitive vision and robotics
—In this work, we make use of 3D visual contours carrying geometric as well as appearance information. Between these contours, we define 3D relations that encode structural info...
Emre Baseski, Leon Bodenhagen, Nicolas Pugeault, S...