Sciweavers

681 search results - page 56 / 137
» Searching with expectations
Sort
View
PKC
2009
Springer
142views Cryptology» more  PKC 2009»
16 years 11 days ago
Identification of Multiple Invalid Signatures in Pairing-Based Batched Signatures
This paper describes new methods in pairing-based signature schemes for identifying the invalid digital signatures in a batch, after batch verification has failed. These methods ef...
Brian J. Matt
HICSS
2007
IEEE
153views Biometrics» more  HICSS 2007»
15 years 6 months ago
Mobile TV - To Live or Die by Content
Mobile TV is described as a natural and evolutionary next step as mobile phones get more multimedia features. Mobile network operators expect mobile TV to support the adoption of ...
Christer Carlsson, Pirkko Walden
IWCLS
2007
Springer
15 years 6 months ago
On Lookahead and Latent Learning in Simple LCS
Learning Classifier Systems use evolutionary algorithms to facilitate rule- discovery, where rule fitness is traditionally payoff based and assigned under a sharing scheme. Most c...
Larry Bull
DAS
2010
Springer
15 years 3 months ago
Memory-based recognition of camera-captured characters
This paper addresses how to quickly recognize a character pattern using a lot of case examples without learning. Here without learning means just finding the most similar example...
Masakazu Iwamura, Tomohiko Tsuji, Koichi Kise
GECCO
2005
Springer
103views Optimization» more  GECCO 2005»
15 years 5 months ago
Maximally rugged NK landscapes contain the highest peaks
NK models provide a family of tunably rugged fitness landscapes used in a wide range of evolutionary computation studies. It is well known that the average height of local optima...
Benjamin Skellett, Benjamin Cairns, Nicholas Geard...