Sciweavers

1116 search results - page 122 / 224
» Key Agreement Using Statically Keyed Authenticators
Sort
View
91
Voted
KI
2009
Springer
15 years 5 months ago
Beyond Public Announcement Logic: An Alternative Approach to Some AI Puzzles
In the paper we present a dynamic model of knowledge. The model is inspired by public announcement logic and an approach to a puzzle concerning knowledge and communication using th...
Pawel Garbacz, Piotr Kulicki, Marek Lechniak, Robe...
92
Voted
JIT
1999
Springer
81views Database» more  JIT 1999»
15 years 5 months ago
A Jini-based Gateway Architecture for Mobile Devices
In the near future we expect a widespread deployment of mobile computational resources including network-enabled end devices like Laptops and PDAs. An interesting problem then and ...
Gerd Aschemann, Roger Kehr, Andreas Zeidler
IICAI
2007
15 years 2 months ago
Modeling Temporal Behavior via Structured Hidden Markov Models: an Application to Keystroking Dynamics
Structured Hidden Markov Models (S-HMM) are a variant of Hierarchical Hidden Markov Models; it provides an abstraction mechanism allowing a high level symbolic description of the k...
Ugo Galassi, Attilio Giordana, Charbel Julien, Lor...
CORR
2010
Springer
83views Education» more  CORR 2010»
15 years 23 days ago
Recursive Secret Sharing for Distributed Storage and Information Hiding
Abstract--This paper presents a recursive computational multisecret sharing technique that hides k - 2 secrets of size b each into n shares of a single secret S of size b, such tha...
Abhishek Parakh, Subhash Kak
94
Voted
ISBI
2009
IEEE
15 years 7 months ago
Fundamental Analysis of Lateral Displacement Estimation Quality in Ultrasound Elastography
Complementary to axial, lateral displacement and strain can provide important information on the biological soft tissues in all applications of elastography. In this paper, the ef...
Jianwen Luo, Elisa E. Konofagou