During the past few decades deniable authentication protocol has been studied. A lot of deniable authentication protocols have been proposed which claimed that have the security properties, for example, authentication, deniability and so on. To the authors' knowledge, these security properties and deniable authentication protocols are analyzed with informal method ...Download Now
The generalization ability of Neural Networks (NNs) is an important performance criterion of NNs. Researchers of this domain have been making an effort to promote the generalization ability of NNs. For solving this problem, people had presented several methods, for example, early stopping, regularization, result-feedback, fuzzification of input vector, neural ...Download Now
Organizations worldwide have been exploring ways to improve business practices to gain competitive edge. One of the most important technological innovations of the last decade has been the emergence of ERP solutions. But implementation of ERP is not just a technological challenge. It's a socio-technological endeavor, which mandates modifying existing ...Download Now
Submit Your Content
Get your content listed in our directory for free!
Our directory is the largest library of vendor-supplied technical content on the web. It's also the first place IT decision makers turn to when researching technology solutions. Our members are already finding your competitors' papers here - shouldn't they find yours too?