Sciweavers

1554 search results - page 96 / 311
» cases 2003
Sort
View
IJNSEC
2008
106views more  IJNSEC 2008»
14 years 9 months ago
Comments on the Security Flaw of Hwang et al.'s Blind Signature Scheme
In 2003, Hwang et al. proposed a new blind signature based on the RSA cryptosystem by employing Extended Euclidean algorithm. They claimed that the proposed scheme was untraceable...
Fang-Ping Chiang, Yi-Mien Lin, Ya-Fen Chang
AUTOMATICA
2004
91views more  AUTOMATICA 2004»
14 years 9 months ago
Comparing digital implementation via the bilinear and step-invariant transformations
From an analog system K, digital systems Kd and Kbt are often obtained via the step-invariant and bilinear transformations, respectively. For the case when K is stable, it is show...
Guofeng Zhang, Tongwen Chen
IJON
2011
91views more  IJON 2011»
14 years 4 months ago
Asymptotic properties of mixture-of-experts models
The statistical properties of the likelihood ratio test statistic (LRTS) for mixture-of-expert models are addressed in this paper. This question is essential when estimating the nu...
Madalina Olteanu, Joseph Rynkiewicz
DIALM
2003
ACM
113views Algorithms» more  DIALM 2003»
15 years 3 months ago
Multicast time maximization in energy constrained wireless networks
We consider the problem of maximizing the lifetime of a given multicast connection in a wireless network of energyconstrained (e.g. battery-operated) nodes, by choosing ideal tran...
Patrik Floréen, Petteri Kaski, Jukka Kohone...
NSPW
2003
ACM
15 years 3 months ago
Locality: a new paradigm for thinking about normal behavior and outsider threat
Locality as a unifying concept for understanding the normal behavior of benign users of computer systems is suggested as a unifying paradigm that will support the detection of mal...
John McHugh, Carrie Gates