Sciweavers

5388 search results - page 961 / 1078
» The Active Elastic Model
Sort
View
75
Voted
CORR
2006
Springer
103views Education» more  CORR 2006»
15 years 25 days ago
Unifying Lexicons in view of a Phonological and Morphological Lexical DB
The present work falls in the line of activities promoted by the European Languguage Resource Association (ELRA) Production Committee (PCom) and raises issues in methods, procedur...
Federico Calzolari, Michele Mammini, Monica Monach...
99
Voted
CSDA
2006
122views more  CSDA 2006»
15 years 25 days ago
The fuzzy approach to statistical analysis
For the last decades, research studies have been developed in which a coalition of Fuzzy Sets Theory and Statistics has been established with different purposes. These namely are:...
Renato Coppi, María Angeles Gil, Henk A. L....
ENTCS
2006
145views more  ENTCS 2006»
15 years 24 days ago
Real-or-random Key Secrecy of the Otway-Rees Protocol via a Symbolic Security Proof
We present the first cryptographically sound security proof of the well-known Otway-Rees protocol. More precisely, we show that the protocol is secure against arbitrary active att...
Michael Backes
102
Voted
EOR
2006
106views more  EOR 2006»
15 years 24 days ago
Synergy analysis of collaborative supply chain management in energy systems using multi-period MILP
Energy, a fundamental entity of modern life, is usually produced using fossil fuels as the primary raw material. A consequence of burning fossil fuels is the emission of environme...
Ahu Soylu, Cihan Oruç, Metin Türkay, K...
IJNSEC
2008
69views more  IJNSEC 2008»
15 years 24 days ago
Proof of Forward Security for Password-based Authenticated Key Exchange
Recently, M. Abdalla et al. proposed a slightly different variant of AuthA, based on the scheme proposed by E. Bresson et al., and provided the first complete proof of forward-sec...
Shuhua Wu, Yuefei Zhu