Sciweavers

2076 search results - page 285 / 416
» Functional logic overloading
Sort
View
ACNS
2008
Springer
132views Cryptology» more  ACNS 2008»
15 years 8 months ago
Analysis of EAP-GPSK Authentication Protocol
Abstract. The EAP-GPSK protocol is a lightweight, flexible authentication protocol relying on symmetric key cryptography. It is part of an ongoing IETF process to develop authenti...
John C. Mitchell, Arnab Roy, Paul Rowe, Andre Sced...
FUZZIEEE
2007
IEEE
15 years 8 months ago
Consistency of Reciprocal Preference Relations
— The consistency of reciprocal preference relations is studied. Consistency is related with rationality, which is associated with the transitivity property. For fuzzy preference...
Francisco Chiclana, Enrique Herrera-Viedma, Sergio...
FUZZIEEE
2007
IEEE
15 years 8 months ago
Nonlinear Classification by Genetic Algorithm with Signed Fuzzy Measure
—In this paper, we propose a new nonlinear classier based on a generalized Choquet integral with signed fuzzy measures to enhance the classification power by capturing all possib...
Honggang Wang, Hua Fang, Hamid Sharif, Zhenyuan Wa...
FUZZIEEE
2007
IEEE
15 years 8 months ago
Social Measures and Flexible Navigation on Online Contact Networks
— This paper discusses ways of navigating online contact networks - networks of social connections defined under a relational context - on a way that can provide much more meani...
Nikolaos Korfiatis, Miguel-Ángel Sicilia
ICNS
2007
IEEE
15 years 8 months ago
Combination of Zero-Forcing Nulling and Fuzzy Parallel Multistage Detection for MIMO Systems
We propose zero-forcing (ZF) nulling followed by fuzzy parallel multistage detection for multi-input multi-output system. The parallel detector consists of two or more stages, the...
Tseng Shu-Ming, Yu Hung-Chieh, Huang Yao-Min