Sciweavers

2340 search results - page 84 / 468
» Second quarter 2008
Sort
View
IJAMC
2008
84views more  IJAMC 2008»
14 years 12 months ago
Towards an authentication service for Peer-to-Peer based Massively Multiuser Virtual Environments
Abstract-- In this paper we propose a distributed authentication service for peer-to-peer (P2P) based massively multiuser virtual environments. Such a service is necessary to provi...
Arno Wacker, Gregor Schiele, Sebastian Schuster, T...
IJAR
2008
74views more  IJAR 2008»
14 years 12 months ago
Unifying practical uncertainty representations - I: Generalized p-boxes
Abstract. There exist several simple representations of uncertainty that are easier to handle than more general ones. Among them are random sets, possibility distributions, probabi...
Sébastien Destercke, Didier Dubois, Eric Ch...
IJCINI
2008
107views more  IJCINI 2008»
14 years 12 months ago
Artificial Neural Networks that Classify Musical Chords
An artificial neural network was trained to classify musical chords into four categories--major, dominant seventh, minor, or diminished seventh--independent of musical key. After ...
Vanessa Yaremchuk, Michael R. W. Dawson
IJISEC
2008
92views more  IJISEC 2008»
14 years 12 months ago
A coding approach to the multicast stream authentication problem
We study the multicast stream authentication problem when an opponent can drop, reorder and introduce data packets into the communication channel. In such a model, packet overhead...
Christophe Tartary, Huaxiong Wang, Josef Pieprzyk
IJNSEC
2008
85views more  IJNSEC 2008»
14 years 12 months ago
A Self-healing Key Distribution Scheme with Novel Properties
We improve a secret sharing scheme, which enables users select their personal keys by themselves instead of being distributed by group manager and users can reuse their personal k...
Biming Tian, Mingxing He