Sciweavers

1554 search results - page 96 / 311
» cases 2003
Sort
View
IJNSEC
2008
106views more  IJNSEC 2008»
15 years 5 months ago
Comments on the Security Flaw of Hwang et al.'s Blind Signature Scheme
In 2003, Hwang et al. proposed a new blind signature based on the RSA cryptosystem by employing Extended Euclidean algorithm. They claimed that the proposed scheme was untraceable...
Fang-Ping Chiang, Yi-Mien Lin, Ya-Fen Chang
AUTOMATICA
2004
91views more  AUTOMATICA 2004»
15 years 5 months ago
Comparing digital implementation via the bilinear and step-invariant transformations
From an analog system K, digital systems Kd and Kbt are often obtained via the step-invariant and bilinear transformations, respectively. For the case when K is stable, it is show...
Guofeng Zhang, Tongwen Chen
139
Voted
IJON
2011
91views more  IJON 2011»
15 years 4 days ago
Asymptotic properties of mixture-of-experts models
The statistical properties of the likelihood ratio test statistic (LRTS) for mixture-of-expert models are addressed in this paper. This question is essential when estimating the nu...
Madalina Olteanu, Joseph Rynkiewicz
DIALM
2003
ACM
113views Algorithms» more  DIALM 2003»
15 years 10 months ago
Multicast time maximization in energy constrained wireless networks
We consider the problem of maximizing the lifetime of a given multicast connection in a wireless network of energyconstrained (e.g. battery-operated) nodes, by choosing ideal tran...
Patrik Floréen, Petteri Kaski, Jukka Kohone...
NSPW
2003
ACM
15 years 10 months ago
Locality: a new paradigm for thinking about normal behavior and outsider threat
Locality as a unifying concept for understanding the normal behavior of benign users of computer systems is suggested as a unifying paradigm that will support the detection of mal...
John McHugh, Carrie Gates