Sciweavers

JUCS
2008
116views more  JUCS 2008»
13 years 3 months ago
Parallel Key Exchange
: In the paper we study parallel key exchange among multiple parties. The status of parallel key exchange can be depicted by a key graph. In a key graph, a vertex represents a part...
Ik Rae Jeong, Dong Hoon Lee
JUCS
2008
169views more  JUCS 2008»
13 years 3 months ago
Advances in Document Engineering
Rafael Dueire Lins
JUCS
2008
132views more  JUCS 2008»
13 years 3 months ago
Searching ... in a Web
: Search engines--"web dragons"--are the portals through which we access society's treasure trove of information. They do not publish the algorithms they use to sort...
Ian H. Witten
JUCS
2008
140views more  JUCS 2008»
13 years 3 months ago
Collective Intelligence for Semantic and Knowledge Grid
Jason J. Jung, Ngoc Thanh Nguyen
JUCS
2006
114views more  JUCS 2006»
13 years 4 months ago
Pseudorandom Number Generation: Impossibility and Compromise
Abstract: Pseudorandom number generators are widely used in the area of simulation. Defective generators are still widely used in standard library programs, although better pseudor...
Makoto Matsumoto, Mutsuo Saito, Hiroshi Haramoto, ...
JUCS
2006
135views more  JUCS 2006»
13 years 4 months ago
Operational/Interpretive Unfolding of Multi-adjoint Logic Programs
Abstract: Multi-adjoint logic programming represents a very recent, extremely flexible attempt for introducing fuzzy logic into logic programming. In this setting, the execution of...
Pascual Julián, Ginés Moreno, Jaime ...
JUCS
2006
83views more  JUCS 2006»
13 years 4 months ago
Ridge Orientation Estimation and Verification Algorithm for Fingerprint Enhancement
: Fingerprint image enhancement is a common and critical step in fingerprint recognition systems. To enhance the images, most of the existing enhancement algorithms use filtering t...
Li-min Liu, Tian-Shyr Dai
JUCS
2006
123views more  JUCS 2006»
13 years 4 months ago
Persian/Arabic Baffletext CAPTCHA
: Nowadays, many daily human activities such as education, trade, talks, etc are done by using the Internet. In such things as registration on Internet web sites, hackers write pro...
Mohammad Hassan Shirali-Shahreza, Mohammad Shirali...
JUCS
2006
91views more  JUCS 2006»
13 years 4 months ago
Selected Papers from SBLP 2006: The 10th Brazilian Symposium on Programming Languages
Mariza Andrade da Silva Bigonha, Alex de Vasconcel...
JUCS
2006
109views more  JUCS 2006»
13 years 4 months ago
4M - Software for Modelling and Analysing Cropping Systems
: Models have played an important role in scientific research for a long time. The crop models try to simulate the functioning of the atmosphere-soil-plant system with the help of ...
Nándor Fodor