Sciweavers

10996 search results - page 2134 / 2200
» Future Directions in Computing
Sort
View
156
Voted
CCS
2005
ACM
15 years 10 months ago
Preventing attribute information leakage in automated trust negotiation
Automated trust negotiation is an approach which establishes trust between strangers through the bilateral, iterative disclosure of digital credentials. Sensitive credentials are ...
Keith Irwin, Ting Yu
128
Voted
EUROCRYPT
2005
Springer
15 years 10 months ago
Approximate Quantum Error-Correcting Codes and Secret Sharing Schemes
It is a standard result in the theory of quantum error-correcting codes that no code of length n can fix more than n/4 arbitrary errors, regardless of the dimension of the coding ...
Claude Crépeau, Daniel Gottesman, Adam Smit...
150
Voted
EVOW
2005
Springer
15 years 10 months ago
Convergence Synthesis of Dynamic Frequency Modulation Tones Using an Evolution Strategy
This paper reports on steps that have been taken to enhance previously presented evolutionary sound matching work. In doing so, the convergence characteristics are shown to provide...
Thomas J. Mitchell, Anthony G. Pipe
HPCC
2005
Springer
15 years 10 months ago
A Hybrid Web Server Architecture for Secure e-Business Web Applications
Nowadays the success of many e-commerce applications, such as on-line banking, depends on their reliability, robustness and security. Designing a web server architecture that keep...
Vicenç Beltran, David Carrera, Jordi Guitar...
132
Voted
ICNC
2005
Springer
15 years 10 months ago
Line-Based PCA and LDA Approaches for Face Recognition
Principal Component Analysis (PCA) and Linear Discriminant Analysis (LDA) techniques are important and well-developed area of image recognition and to date many linear discriminati...
Vo Dinh Minh Nhat, Sungyoung Lee
« Prev « First page 2134 / 2200 Last » Next »