Sciweavers

13717 search results - page 2486 / 2744
» Control Systems
Sort
View
154
Voted
ACNS
2003
Springer
131views Cryptology» more  ACNS 2003»
15 years 8 months ago
On the Security of Two Threshold Signature Schemes with Traceable Signers
A (t, n) threshold signature scheme allows t or more group members to generate signatures on behalf of a group with n members, while any t−1 or less members cannot do the same th...
Guilin Wang, Xiaoxi Han, Bo Zhu
AGENTLINK
2003
Springer
246views ECommerce» more  AGENTLINK 2003»
15 years 8 months ago
User Profiling with Privacy: A Framework for Adaptive Information Agents
This paper presents a framework for personal agents that respect the privacy of the individual. We present some motivations and outline a framework for the use of personal agents a...
Ian Dickinson, Dave Reynolds, Dave Banks, Steve Ca...
117
Voted
ATAL
2003
Springer
15 years 8 months ago
Scenario description for multi-agent simulation
Making it easier to design interactions between agents and humans is essential for realizing multi-agent simulations of social phenomena such as group dynamics. To realize large-s...
Yohei Murakami, Toru Ishida, Tomoyuki Kawasoe, Rei...
96
Voted
AVBPA
2003
Springer
152views Biometrics» more  AVBPA 2003»
15 years 8 months ago
The BANCA Database and Evaluation Protocol
In this paper we describe the acquistion and content of a new large, realistic and challenging multi-modal database intended for training and testing multi-modal verification syst...
Enrique Bailly-Bailliére, Samy Bengio, Fr&e...
124
Voted
CC
2003
Springer
15 years 8 months ago
Improving Data Locality by Chunking
Cache memories were invented to decouple fast processors from slow memories. However, this decoupling is only partial, and many researchers have attempted to improve cache use by p...
Cédric Bastoul, Paul Feautrier
« Prev « First page 2486 / 2744 Last » Next »