Sciweavers

236 search results - page 21 / 48
» From Weak to Strong Watermarking
Sort
View
EUROPKI
2008
Springer
15 years 1 months ago
Efficient Generic Forward-Secure Signatures and Proxy Signatures
We propose a generic method to construct forward-secure signature schemes from standard signature schemes. The proposed construction is more computationally efficient than previous...
Basel Alomair, Krishna Sampigethaya, Radha Poovend...
NECO
2010
78views more  NECO 2010»
14 years 10 months ago
Hebbian Plasticity and Homeostasis in a Model of Hypercolumn of the Visual Cortex
Neurons in the nervous system display a wide variety of plasticity processes. Among them are covariance based rules and homeostatic plasticity. By themselves, the first ones tend...
R. Rossi Pool, G. Mato
DSVIS
2003
Springer
15 years 5 months ago
Evaluating and Comparing Interaction Styles
Research has created many new generation (post-WIMP) Interaction styles (IS) in the past years. From Ubiquitous to Affective Computing, researchers have not kept a uniform standard...
Georgios Christou, Robert J. K. Jacob
CONCUR
2007
Springer
15 years 3 months ago
Equivalence Checking for Infinite Systems Using Parameterized Boolean Equation Systems
Abstract. In this paper, we provide a transformation from the branching bisimulation problem for infinite, concurrent, data-intensive systems in linear process format, into solving...
Taolue Chen, Bas Ploeger, Jaco van de Pol, Tim A. ...
SLOGICA
2010
138views more  SLOGICA 2010»
14 years 10 months ago
Extensionality and Restriction in Naive Set Theory
Abstract. The naive set theory problem is to begin with a full comprehension axiom, and to find a logic strong enough to prove theorems, but weak enough not to prove everything. T...
Zach Weber