Sciweavers

1255 search results - page 194 / 251
» On Simple and Secure Key Distribution
Sort
View
CEAS
2006
Springer
15 years 8 months ago
Sender Reputation in a Large Webmail Service
In this paper, we describe how a large webmail service uses reputation to classify authenticated sending domains as either spammy or not spammy. Both SPF and DomainKey authenticat...
Bradley Taylor
SCM
1998
15 years 5 months ago
Coordinated Editing of Versioned Packages in the JP Programming Environment
As part of an investigation of scalable development techniques for systems written in the JavaTM programming language, the Forest Project is building JP, a prototype distributed pr...
Michael L. Van de Vanter
CSREASAM
2009
15 years 5 months ago
A Tripartite Strong Designated Verifier Scheme Based On Threshold RSA Signatures
In this paper we propose a new designated verifier signature scheme based on the threshold signature scheme presented [8] by Ghodosi and Pieprzyk. The advantages of the new scheme ...
Jerome Dossogne, Olivier Markowitch
IJCINI
2008
107views more  IJCINI 2008»
15 years 4 months ago
Artificial Neural Networks that Classify Musical Chords
An artificial neural network was trained to classify musical chords into four categories--major, dominant seventh, minor, or diminished seventh--independent of musical key. After ...
Vanessa Yaremchuk, Michael R. W. Dawson
JEI
2006
110views more  JEI 2006»
15 years 4 months ago
Empirical formula for creating error bars for the method of paired comparison
The method of paired comparison based on Thurstone's Case V of his Law of Comparative Judgments is often used as a psychophysical method to derive interval scales of perceptua...
Ethan D. Montag