Sciweavers

700 search results - page 113 / 140
» words 2005
Sort
View
INFORMATICALT
2006
177views more  INFORMATICALT 2006»
14 years 9 months ago
Cryptanalysis and Improvement of Practical Convertible Authenticated Encryption Schemes Using Self-Certified Public Keys
A convertible authenticated encryption scheme allows a specified recipient to recover and verify a message simultaneously. Moreover the recipient can prove the dishonesty of the se...
Zuhua Shao
JAPLL
2006
112views more  JAPLL 2006»
14 years 9 months ago
Intuitionistic hybrid logic
Hybrid logics are a principled generalization of both modal logics and description logics, a standard formalism for knowledge representation. In this paper we give the first const...
Torben Braüner, Valeria de Paiva
ACS
2005
14 years 9 months ago
Relating Categorical Semantics for Intuitionistic Linear Logic
There are several kinds of linear typed calculus in the literature, some with their associated notion of categorical model. Our aim in this paper is to systematise the relationshi...
Maria Emilia Maietti, Paola Maneggia, Valeria de P...
ADCM
2005
163views more  ADCM 2005»
14 years 9 months ago
Matrix-valued radial basis functions: stability estimates and applications
Radial basis functions (RBFs) have found important applications in areas such as signal processing, medical imaging, and neural networks since the early 1980's. Several appli...
Svenja Lowitzsch
81
Voted
ADHOC
2005
100views more  ADHOC 2005»
14 years 9 months ago
Robust position-based routing for wireless ad hoc networks
We consider a wireless ad hoc network composed of a set of wireless nodes distributed in a two dimensional plane. Several routing protocols based on the positions of the mobile ho...
Kousha Moaveninejad, Wen-Zhan Song, Xiang-Yang Li