Sciweavers

1302 search results - page 22 / 261
» Soundness in the Public-Key Model
Sort
View
CCS
2001
ACM
15 years 6 months ago
The performance of public key-enabled kerberos authentication in mobile computing applications
Authenticating mobile computing users can require a significant amount of processing and communications resources— particularly when protocols based on public key encryption are...
Alan Harbitter, Daniel A. Menascé
ICRA
2000
IEEE
98views Robotics» more  ICRA 2000»
15 years 6 months ago
Active Measurement of Contact Sounds
We describe a novel system for robotic measurement of contact sounds. This system is well suited for acquiring impulse-response sound models. A brief explanation of the sound mode...
Joshua L. Richmond, Dinesh K. Pai
COLING
2002
15 years 1 months ago
Determining Recurrent Sound Correspondences by Inducing Translation Models
I present a novel approach to the determination of recurrent sound correspondences in bilingual wordlists. The idea is to relate correspondences between sounds in wordlists to tra...
Grzegorz Kondrak
DEXAW
2003
IEEE
99views Database» more  DEXAW 2003»
15 years 7 months ago
A Coloured Petri Net Trust Model
Public-key infrastructures are a prerequisite for security in distributed systems and for reliable electronic commerce. It is their goal to provide the authenticity of public keys...
Peter Lory
ICANN
2007
Springer
15 years 8 months ago
Separation and Recognition of Multiple Sound Source Using Pulsed Neuron Model
Many applications would emerge from the development of artificial systems able to accurately localize and identify sound sources. However, one of the main difficulties of such kin...
Kaname Iwasa, Hideaki Inoue, Mauricio Kugler, Susu...