Sciweavers

70 search results - page 7 / 14
» informaticalt 2008
Sort
View
INFORMATICALT
2007
112views more  INFORMATICALT 2007»
14 years 9 months ago
A New ID-Based Deniable Authentication Protocol
Abstract. Deniable authenticated protocol is a new cryptographic authentication protocol that enables a designated receiver to identify the source of a given message without being ...
Rongxing Lu, Zhenfu Cao, Shengbao Wang, Haiyong Ba...
INFORMATICALT
2008
93views more  INFORMATICALT 2008»
14 years 9 months ago
Viewcharts: Syntax and Semantics
In this paper, we present a method for describing the syntax and semantics of viewcharts. Viewcharts is a visual formalism for describing the dynamic behavior of system components....
Ayaz Isazadeh, Jaber Karimpour
INFORMATICALT
2008
127views more  INFORMATICALT 2008»
14 years 9 months ago
Energy Cost Optimization by Adequate Transmission Rate Dividing in Wireless Communication System
Abstract. Energy cost is the main constraint in modern wireless communication system. A powerful scheme due to optimal energy cost is provided for a single node server in this pape...
Reu-Ching Chen, Chen-Sung Chang
INFORMATICALT
2008
139views more  INFORMATICALT 2008»
14 years 9 months ago
Fingerprint Minutiae Matching without Global Alignment Using Local Structures
This paper presents a method of minutiae based fingerprint matching that is robust to deformations and does not do fingerprint alignment. It concentrates on comparing rotation and ...
Andrej Kisel, Alexej Kochetkov, Justas Kranauskas
INFORMATICALT
2008
104views more  INFORMATICALT 2008»
14 years 9 months ago
An Efficient Technique to Detect Visual Defects in Particleboards
This paper is concerned with the problem of image analysis based detection of local defects embedded in particleboard surfaces. Though simple, but efficient technique developed is ...
Jonas Guzaitis, Antanas Verikas