Sciweavers

135 search results - page 22 / 27
» A conceptual framework for Group-Centric secure information ...
Sort
View
FOCS
2000
IEEE
14 years 5 days ago
Private Quantum Channels
Shannon [Sha48, Sha49] in celebrated works had shown that n bits of shared key is necessary and sufficient to transmit n-bit classical information in an information-theoretically ...
Andris Ambainis, Michele Mosca, Alain Tapp, Ronald...
SIGUCCS
2000
ACM
13 years 11 months ago
Windows 2000 Deployment Technical Challenges at the University of Colorado at Boulder
Microsoft Windows 2000 represents a major change in desktop and network operating systems. This latest Windows operating system includes many new features and technologies that wi...
Brad Judy, Alfred Roberts, David Bodnar
DRM
2003
Springer
14 years 29 days ago
Digital rights management in a 3G mobile phone and beyond
In this paper we examine how copyright protection of digital items can be securely managed in a 3G mobile phone and other devices. First, the basic concepts, strategies, and requi...
Thomas S. Messerges, Ezzat A. Dabbish
AIRS
2005
Springer
14 years 1 months ago
The Empirical Impact of the Nature of Novelty Detection
Sentence level novelty detection aims at spotting sentences with novel information from an ordered sentence list. In the task, sentences appearing later in the list with no new me...
Le Zhao, Min Zhang, Shaoping Ma
IOR
2010
169views more  IOR 2010»
13 years 6 months ago
Dynamic Supplier Contracts Under Asymmetric Inventory Information
In this paper, we examine a supply chain in which a single supplier sells to a downstream retailer. We consider a multi-period model, with the following sequence of events. In per...
Hao Zhang, Mahesh Nagarajan, Greys Sosic