Sciweavers

507 search results - page 59 / 102
» The XTR Public Key System
Sort
View
ENTCS
2000
112views more  ENTCS 2000»
15 years 27 days ago
Typed Multiset Rewriting Specifications of Security Protocols
The language MSR has successfully been used in the past to prove undecidability about security protocols modeled according to the Dolev-Yao abstraction. In this paper, we revise t...
Iliano Cervesato
154
Voted
DATAMINE
1999
140views more  DATAMINE 1999»
15 years 23 days ago
A Scalable Parallel Algorithm for Self-Organizing Maps with Applications to Sparse Data Mining Problems
Abstract. We describe a scalable parallel implementation of the self organizing map (SOM) suitable for datamining applications involving clustering or segmentation against large da...
Richard D. Lawrence, George S. Almasi, Holly E. Ru...
103
Voted
MP
1998
76views more  MP 1998»
15 years 22 days ago
Warm start of the primal-dual method applied in the cutting-plane scheme
A practical warm-start procedure is described for the infeasible primal-dualinterior-point method employed to solve the restricted master problem within the cutting-plane method. ...
Jacek Gondzio
101
Voted
JUCS
2010
139views more  JUCS 2010»
14 years 11 months ago
LemmaGen: Multilingual Lemmatisation with Induced Ripple-Down Rules
: Lemmatisation is the process of finding the normalised forms of words appearing in text. It is a useful preprocessing step for a number of language engineering and text mining t...
Matjaz Jursic, Igor Mozetic, Tomaz Erjavec, Nada L...
IJACTAICIT
2010
361views more  IJACTAICIT 2010»
14 years 10 months ago
A Proposed Technique for Information Hiding Based on DCT
The aim of this work is to design an algorithm which combines between steganography and cryptography that can hide a text in an image in a way that prevents, as much as possible, ...
Fadhil Salman Abed, Nada Abdul Aziz Mustafa