Sciweavers

4074 search results - page 661 / 815
» Abstract Graph Transformation
Sort
View
IMA
2005
Springer
126views Cryptology» more  IMA 2005»
15 years 7 months ago
Security Proof of Sakai-Kasahara's Identity-Based Encryption Scheme
Abstract. Identity-based encryption (IBE) is a special asymmetric encryption method where a public encryption key can be an arbitrary identifier and the corresponding private decr...
Liqun Chen, Zhaohui Cheng
ISMIS
2005
Springer
15 years 7 months ago
Learning the Daily Model of Network Traffic
Abstract. Anomaly detection is based on profiles that represent normal behaviour of users, hosts or networks and detects attacks as significant deviations from these profiles. In t...
Costantina Caruso, Donato Malerba, Davide Papagni
IVA
2005
Springer
15 years 7 months ago
An Objective Character Believability Evaluation Procedure for Multi-agent Story Generation Systems
Abstract. The ability to generate narrative is of importance to computer systems that wish to use story effectively for entertainment, training, or education. One of the focuses of...
Mark O. Riedl, R. Michael Young
143
Voted
JSAI
2005
Springer
15 years 7 months ago
Towards Ontologies of Functionality and Semantic Annotation for Technical Knowledge Management
Abstract. This research aims at promoting sharing of knowledge about functionality of artifacts among engineers, which tends to be implicit in practice. In order to provide a conce...
Yoshinobu Kitamura, Naoya Washio, Yusuke Koji, Rii...
141
Voted
PCM
2005
Springer
122views Multimedia» more  PCM 2005»
15 years 7 months ago
High Efficient Context-Based Variable Length Coding with Parallel Orientation
Abstract. Entropy coding is one of the most important techniques in video codec. Two main criteria to assess an entropy coder are coding efficiency and friendly realization charact...
Qiang Wang, Debin Zhao, Wen Gao, Siwei Ma