Sciweavers

20126 search results - page 3716 / 4026
» Timed Transition Systems
Sort
View
ITIIS
2010
200views more  ITIIS 2010»
15 years 7 days ago
New Techniques for Anonymous HIBE with Short Ciphertexts in Prime Order Groups
Anonymous hierarchical identity based encryption (HIBE) is an extension of identity based encryption (IBE) that can use an arbitrary string like an e-mail address for a public key...
Kwangsu Lee, Dong Hoon Lee
JCNS
2010
121views more  JCNS 2010»
15 years 6 days ago
Pattern orthogonalization via channel decorrelation by adaptive networks
The early processing of sensory information by neuronal circuits often includes a reshaping of activity patterns that may facilitate the further processing of stimulus representat...
Stuart D. Wick, Martin T. Wiechert, Rainer W. Frie...
JDCTA
2010
148views more  JDCTA 2010»
15 years 6 days ago
Design and Implementation of a Novel General-purpose Enterprise Application Business Infrastructure Software Platform
Platform-based development is currently the dominant development method of enterprise application, but the features provided by current mainstream enterprise application developme...
Yao Rong, Jiandong Wang
JDCTA
2010
172views more  JDCTA 2010»
15 years 6 days ago
Characterizing MEGACO Security in the presence Diameter Server
This paper analyzes performance of MEGACO (Media Gateway Control Protocol) based on Diameter which is an Authentication, Authorization,andAccounting (AAA) protocol developed withi...
Pedram Hajipour, Kolsoom Abbasi Shahkooh
JORS
2010
134views more  JORS 2010»
15 years 6 days ago
An overview and framework for PD backtesting and benchmarking
In order to manage model risk, financial institutions need to set up validation processes so as to monitor the quality of the models on an ongoing basis. Validation can be conside...
G. Castermans, David Martens, Tony Van Gestel, B. ...
« Prev « First page 3716 / 4026 Last » Next »