Sciweavers

10871 search results - page 2063 / 2175
» A stable programming language
Sort
View
ISCI
2008
93views more  ISCI 2008»
13 years 10 months ago
Safety, domain independence and translation of complex value database queries
This paper considers the theory of database queries on the complex value data model with external functions. Motivated by concerns regarding query evaluation, we first identify re...
Hong-Cheu Liu, Jeffrey Xu Yu, Weifa Liang
IJCSA
2006
95views more  IJCSA 2006»
13 years 10 months ago
Modeling and Formal Verification of DHCP Using SPIN
The Dynamic Host Configuration Protocol (DHCP) is a widely used communication protocol. In this paper, a portion of the protocol is chosen for modeling and verification, namely th...
Syed M. S. Islam, Mohammed H. Sqalli, Sohel Khan
IJNSEC
2006
94views more  IJNSEC 2006»
13 years 10 months ago
A Binary Redundant Scalar Point Multiplication in Secure Elliptic Curve Cryptosystems
The main back-bone operation in elliptic curve cryptosystems is scalar point multiplication. The most frequently used method implementing the scalar point multiplication which is ...
Sangook Moon
JCC
2008
105views more  JCC 2008»
13 years 10 months ago
Retrieval of spectral and dynamic properties from two-dimensional infrared pump-probe experiments
Abstract: We have developed a fitting algorithm able to extract spectral and dynamic properties of a three level oscillator from a two-dimensional infrared spectrum (2D-IR) detecte...
Riccardo Chelli, Victor V. Volkov, Roberto Righini
JCM
2008
75views more  JCM 2008»
13 years 10 months ago
A Secure Mobile Agents Platform
Abstract--Mobile Agents is a new paradigm for distributed computing where security is very essential to the acceptance of this paradigm in a large scale distributed environment. In...
Leila Ismail
« Prev « First page 2063 / 2175 Last » Next »