Sciweavers

1172 search results - page 207 / 235
» Constructions of generalized Sidon sets
Sort
View
ACISP
2010
Springer
15 years 1 months ago
Attribute-Based Authenticated Key Exchange
We introduce the concept of attribute-based authenticated key exchange (AB-AKE) within the framework of ciphertext policy attribute-based systems. A notion of AKE-security for AB-A...
M. Choudary Gorantla, Colin Boyd, Juan Manuel Gonz...
APCCM
2008
15 years 1 months ago
A Framework Based Measurements for Evaluating an IS Quality
There is an increasing community of researchers trying to draw attention to the importance of evaluation issues. Some approaches can be followed to evaluate the quality of softwar...
Olfa Lamouchi, Amar Ramdane-Cherif, Nicole L&eacut...
CIMAGING
2010
122views Hardware» more  CIMAGING 2010»
15 years 1 months ago
Symmetrized local co-registration optimization for anomalous change detection
The goal of anomalous change detection (ACD) is to identify what unusual changes have occurred in a scene, based on two images of the scene taken at different times and under diff...
Brendt Wohlberg, James Theiler
IJCAI
2007
15 years 1 months ago
Emotions as Durative Dynamic State for Action Selection
Human intelligence requires decades of full-time training before it can be reliably utilised in modern economies. In contrast, AI agents must be made reliable but interesting in r...
Emmanuel Tanguy, Philip J. Willis, Joanna Bryson
IQ
2007
15 years 1 months ago
Simulations Of Error Propagation For Prioritizing Data Accuracy Improvement Efforts
: Models of the association between input accuracy and output accuracy imply that, for any given application, the effect of input errors on the output error rate generally varies i...
Irit Askira Gelman