Sciweavers

1610 search results - page 165 / 322
» Identity Based Multisignatures
Sort
View
IJISEC
2006
108views more  IJISEC 2006»
15 years 3 months ago
How to obtain full privacy in auctions
Abstract Privacy has become a factor of increasing importance in auction design. We propose general techniques for cryptographic first-price and (M + 1)st-price auction protocols t...
Felix Brandt
JMM2
2006
110views more  JMM2 2006»
15 years 3 months ago
Two-Stage PCA Extracts Spatiotemporal Features for Gait Recognition
We propose a technique for gait recognition from motion capture data based on two successive stages of principal component analysis (PCA) on kinematic data. The first stage of PCA ...
Sandhitsu R. Das, Robert C. Wilson, Maciej T. Laza...
JIRS
2007
119views more  JIRS 2007»
15 years 2 months ago
Design and Stability Analysis of Fuzzy Model-based Predictive Control - A Case Study
In the paper a fuzzy model based predictive control algorithm is presented. The proposed algorithm is developed in the state space and is given in analytical form, which is an adva...
Saso Blazic, Igor Skrjanc
VIROLOGY
2010
179views more  VIROLOGY 2010»
15 years 1 months ago
Automatic binary deobfuscation
Abstract. This paper gives an overview of our research in the automation of the process of software protection analysis. We will focus more particularly on the problem of obfuscati...
Yoann Guillot, Alexandre Gazet
CORR
2011
Springer
151views Education» more  CORR 2011»
14 years 10 months ago
A Simulation Experiment on a Built-In Self Test Equipped with Pseudorandom Test Pattern Generator and Multi-Input Shift Register
This paper investigates the impact of the changes of the characteristic polynomials and initial loadings, on behaviour of aliasing errors of parallel signature analyzer (Multi-Inp...
A. Ahmad