Sciweavers

93
Voted
KES
1999
Springer
15 years 4 months ago
Genetic algorithms vs. Tabu search in timetable scheduling
S. C. Chu, H. L. Fang
82
Voted
KES
1999
Springer
15 years 4 months ago
An elliptic curve authenticated key exchange based approach to key infrastructure
P. Koduri, A. Mahajan, P. Montague, P. Moseley
KES
1999
Springer
15 years 4 months ago
Dynamic Demes parallel genetic algorithm
Abstract—Dynamic Demes is a new method for the parallelisation of evolutionary algorithms. It was derived as a combination of two other parallelisation algorithms: the master-sla...
Mariusz Nowostawski, Riccardo Poli
96
Voted
KES
1999
Springer
15 years 4 months ago
Shape specification in design using fuzzy logic
A shape specification system based on fuzzy logic is proposed, which aims to facilitate designers in conceptual design stage by allowing them to specify and work with rough models...
B. Pham
115
Voted
KES
1999
Springer
15 years 4 months ago
Position-based impedance control using a fuzzy compensator
In this paper, a position-based impedance control with a fuzzy compensator is proposed to improve a force control performance, in which the environment has unknown dynamics or cur...
Fusaomi Nagata, Keigo Watanabe, Kiyotaka Izumi
73
Voted
ISW
1999
Springer
15 years 4 months ago
On Anonymous Electronic Cash and Crime
Anonymous electronic cash systems can be vulnerable to criminal abuse. Two approaches were suggested for solving this problem. In an escrowed cash system users are given anonymity ...
Tomas Sander, Amnon Ta-Shma
117
Voted
ISW
1999
Springer
15 years 4 months ago
Digital Watermarking Robust Against JPEG Compression
Digital watermarking has been considered as an important technique to protect the copyright of digital content. For a digital watermarking method to be effective, it is essential ...
Hye-Joo Lee, Ji-Hwan Park, Yuliang Zheng
84
Voted
ISW
1999
Springer
15 years 4 months ago
On the Security of the Lee-Chang Group Signature Scheme and Its Derivatives
Marc Joye, Narn-Yih Lee, Tzonelih Hwang
ISW
1999
Springer
15 years 4 months ago
Cryptanalysis of Two Group Signature Schemes
Abstract. Group signature schemes allow a group member to anonymously sign on group’s behalf. Moreover, in case of anonymity misuse, a group authority can recover the issuer of a...
Marc Joye, Seungjoo Kim, Narn-Yih Lee
75
Voted
ISW
1999
Springer
15 years 4 months ago
Region-Based Watermarking for Images
There is a spate of research activities investigating digital image watermarking schemes in an effort to control the problem of illegal proliferation of creative digital data acros...
Gareth Brisbane, Reihaneh Safavi-Naini, Philip Ogu...