Sciweavers

1610 search results - page 121 / 322
» Identity Based Multisignatures
Sort
View
CHARME
2005
Springer
143views Hardware» more  CHARME 2005»
15 years 8 months ago
Saturation-Based Symbolic Reachability Analysis Using Conjunctive and Disjunctive Partitioning
Abstract. We propose a new saturation-based symbolic state-space generation algorithm for finite discrete-state systems. Based on the structure of the high-level model specificat...
Gianfranco Ciardo, Andy Jinqing Yu
GECCO
2005
Springer
162views Optimization» more  GECCO 2005»
15 years 8 months ago
Evolution of Voronoi based fuzzy recurrent controllers
A fuzzy controller is usually designed by formulating the knowledge of a human expert into a set of linguistic variables and fuzzy rules. Among the most successful methods to auto...
Carlos Kavka, Patricia Roggero, Marc Schoenauer
WINE
2005
Springer
123views Economy» more  WINE 2005»
15 years 8 months ago
An Adaptive Group-Based Reputation System in Peer-to-Peer Networks
Abstract. As more and more P2P applications being popular in Internet, one of important problem to be solved is inspiring users to cooperate each other actively and honestly, the r...
Liang Sun, Li Jiao, Yufeng Wang, Shiduan Cheng, We...
CIKM
2004
Springer
15 years 8 months ago
Document clustering based on cluster validation
This paper presents a cluster validation based document clustering algorithm, which is capable of identifying both important feature words and true model order (cluster number). I...
Zheng-Yu Niu, Dong-Hong Ji, Chew Lim Tan
EUROPKI
2004
Springer
15 years 8 months ago
Threshold Password-Based Authentication Using Bilinear Pairings
We present a new threshold password-based authentication protocol that allows a roaming user(a user who accesses a network from different client terminals) to download a private k...
Songwon Lee, Kyusuk Han, Seok-kyu Kang, Kwangjo Ki...