Sciweavers

144 search results - page 27 / 29
» informaticalt 2006
Sort
View
INFORMATICALT
2006
177views more  INFORMATICALT 2006»
15 years 21 hour ago
Cryptanalysis and Improvement of Practical Convertible Authenticated Encryption Schemes Using Self-Certified Public Keys
A convertible authenticated encryption scheme allows a specified recipient to recover and verify a message simultaneously. Moreover the recipient can prove the dishonesty of the se...
Zuhua Shao
INFORMATICALT
2006
164views more  INFORMATICALT 2006»
15 years 21 hour ago
Usability Evaluation of a Virtual Museum Interface
The Augmented Representation of Cultural Objects (ARCO) system provides software and interface tools to museum curators to develop virtual museum exhibitions, as well as a virtual ...
Athanasis Karoulis, Stella Sylaiou, Martin White
INFORMATICALT
2006
116views more  INFORMATICALT 2006»
15 years 21 hour ago
Cache-based Statistical Language Models of English and Highly Inflected Lithuanian
This paper investigates a variety of statistical cache-based language models built upon three corpora: English, Lithuanian, and Lithuanian base forms. The impact of the cache size,...
Airenas Vaiciunas, Gailius Raskinis
INFORMATICALT
2006
104views more  INFORMATICALT 2006»
15 years 21 hour ago
Algorithms for Inner Magic and Inner Antimagic Labelings of Some Planar Graphs
In this work labeling of planar graphs is taken up which involves labeling the p vertices, the q edges and the f internal faces such that the weights of the faces form an arithmeti...
Auparajita Krishnaa, Manohar Singh Dulawat
INFORMATICALT
2006
100views more  INFORMATICALT 2006»
15 years 21 hour ago
Optimal Agreement in a Scale-Free Network Environment
Generally, the task in a distributed system must achieve an agreement. It requires a set of processors to agree on a common value even if some components are corrupted. There are s...
Shu-Ching Wang, Kuo-Qin Yan, Mao-Lun Chiang