Sciweavers

IEICET
2016
48views more  IEICET 2016»
10 years 1 months ago
Public-Key Encryption with Lazy Parties
In a public-key encryption scheme, if a sender is not concerned about the security of a message and is unwilling to generate costly randomness, the security of the encrypted messa...
Kenji Yasunaga
IEICET
2016
52views more  IEICET 2016»
10 years 1 months ago
Diagnosis of Stochastic Discrete Event Systems Based on N-Gram Models with Wildcard Characters
—In this paper, a new approach to the diagnosis of stochastic discrete event system is presented. We are developing a method, called sequence profiling, based on N-gram models. ...
Kunihiko Hiraishi, Koichi Kobayashi
IEEERITA
2016
69views more  IEEERITA 2016»
10 years 1 months ago
Virtual Heritage of the Territory: Design and Implementation of Educational Resources in Augmented Reality and Mobile Pedestrian
— In this research we intend to establish the relationships between local heritage educational content of software Pedestrian Navigation Systems Mobile-Augmented Reality and lear...
Jorge Joo Nagata, José Rafael García...
IDA
2016
Springer
10 years 1 months ago
Using a Human Drug Network for generating novel hypotheses about drugs
Hossein Rahmani, Hendrik Blockeel, Andreas Bender