In this paper, we describe how a large webmail service uses reputation to classify authenticated sending domains as either spammy or not spammy. Both SPF and DomainKey authenticat...
As part of an investigation of scalable development techniques for systems written in the JavaTM programming language, the Forest Project is building JP, a prototype distributed pr...
In this paper we propose a new designated verifier signature scheme based on the threshold signature scheme presented [8] by Ghodosi and Pieprzyk. The advantages of the new scheme ...
An artificial neural network was trained to classify musical chords into four categories--major, dominant seventh, minor, or diminished seventh--independent of musical key. After ...
The method of paired comparison based on Thurstone's Case V of his Law of Comparative Judgments is often used as a psychophysical method to derive interval scales of perceptua...