Sciweavers

679 search results - page 63 / 136
» Using decision problems in public key cryptography
Sort
View
ACNS
2008
Springer
94views Cryptology» more  ACNS 2008»
15 years 3 months ago
An Authentication Scheme Based on the Twisted Conjugacy Problem
The conjugacy search problem in a group G is the problem of recovering an x G from given g G and h = x-1 gx. The alleged computational hardness of this problem in some groups was...
Vladimir Shpilrain, Alexander Ushakov
DATAMINE
1999
140views more  DATAMINE 1999»
15 years 1 months ago
A Scalable Parallel Algorithm for Self-Organizing Maps with Applications to Sparse Data Mining Problems
Abstract. We describe a scalable parallel implementation of the self organizing map (SOM) suitable for datamining applications involving clustering or segmentation against large da...
Richard D. Lawrence, George S. Almasi, Holly E. Ru...
AI
2010
Springer
15 years 6 months ago
A Three-Way Decision Approach to Email Spam Filtering
Many classification techniques used for identifying spam emails, treat spam filtering as a binary classification problem. That is, the incoming email is either spam or non-spam....
Bing Zhou, Yiyu Yao, Jigang Luo
ECS
2006
89views more  ECS 2006»
15 years 1 months ago
Dynamic Decision Protocol For Adhoc Network
Several researches were conducted to Ad Hoc networks because of their facility of deployment, no need of an infrastructure and many other features. Thus, they still present many un...
Mohamed Ben Othman
ATAL
2009
Springer
15 years 8 months ago
Pragmatic-strategic reputation-based decisions in BDI agents
Computational trust and reputation models have been recognized as one of the key technologies required to design and implement agent systems. These models manage and aggregate the...
Isaac Pinyol, Jordi Sabater-Mir