Sciweavers

1610 search results - page 101 / 322
» Identity Based Multisignatures
Sort
View
ICANN
2009
Springer
15 years 9 months ago
Recognition of Properties by Probabilistic Neural Networks
The statistical pattern recognition based on Bayes formula implies the concept of mutually exclusive classes. This assumption is not applicable when we have to identify some non-ex...
Jiri Grim, Jan Hora
APCCAS
2006
IEEE
249views Hardware» more  APCCAS 2006»
15 years 9 months ago
Uncertainty Management for Estimation in Dynamical Systems
— A novel black-box model for time series of prices analysis is proposed. It is constructed using the technique of “shaping filter”. The model identification is then propos...
H. Baili
IH
2005
Springer
15 years 8 months ago
A Family of Collusion 2-Secure Codes
Abstract. We present systematic strategy for collusions attacking a fingerprinting scheme. As a particular case, this strategy shows that linear codes are not good fingerprinting...
Josep Cotrina Navau, Marcel Fernandez, Miguel Sori...
CTRSA
2006
Springer
176views Cryptology» more  CTRSA 2006»
15 years 6 months ago
Chosen Ciphertext Secure Public Key Threshold Encryption Without Random Oracles
Abstract. We present a non-interactive chosen ciphertext secure threshold encryption system. The proof of security is set in the standard model and does not use random oracles. Our...
Dan Boneh, Xavier Boyen, Shai Halevi
LREC
2008
85views Education» more  LREC 2008»
15 years 4 months ago
Detecting Errors in Semantic Annotation
We develop a method for detecting errors in semantic predicate-argument annotation, based on the variation n-gram error detection method. After establishing an appropriate data re...
Markus Dickinson, Chong Min Lee