Sciweavers

9425 search results - page 1819 / 1885
» Some Notes on Models and Modelling
Sort
View
ECAI
2006
Springer
15 years 1 months ago
A Real Generalization of Discrete AdaBoost
Scaling discrete AdaBoost to handle real-valued weak hypotheses has often been done under the auspices of convex optimization, but little is generally known from the original boost...
Richard Nock, Frank Nielsen
EUC
2006
Springer
15 years 1 months ago
A Reverse AODV Routing Protocol in Ad Hoc Mobile Networks
In mobile ad hoc networks, mobile devices wander autonomously for the use of wireless links and dynamically varying network topology. AODV (Ad-hoc on-demand Distance vector routing...
Chonggun Kim, Elmurod Talipov, Byoungchul Ahn
FORMATS
2006
Springer
15 years 1 months ago
A Dose of Timed Logic, in Guarded Measure
We consider interval measurement logic IML, a sublogic of Zhou and Hansen's interval logic, with measurement functions which provide real-valued measurement of some aspect of ...
Kamal Lodaya, Paritosh K. Pandya
ACISP
2003
Springer
15 years 1 months ago
Digital Signature Schemes with Restriction on Signing Capability
In some practical circumstances, the ability of a signer should be restricted. In group signature schemes, a group member may be allowed to generate signatures up to a certain numb...
Jung Yeon Hwang, Hyun-Jeong Kim, Dong Hoon Lee, Jo...
ACSAC
2001
IEEE
15 years 1 months ago
CONSEPP: CONvenient and Secure Electronic Payment Protocol Based on X9.59
The security of electronic payment protocols is of interest to researchers in academia and industry. While the ultimate objective is the safest and most secure protocol, convenien...
Albert Levi, Çetin Kaya Koç
« Prev « First page 1819 / 1885 Last » Next »