Sciweavers

36 search results - page 4 / 8
» Breaking the chain
Sort
View
FC
1998
Springer
156views Cryptology» more  FC 1998»
14 years 1 days ago
Assessment of Threats for Smart Card Based Electronic Cash
The security of smart card based electronic cash have been receiving significant attention recently. However, there has been little systematic analysis or quantification of the imp...
Kazuo J. Ezawa, Gregory Napiorkowski
ACL
1998
13 years 9 months ago
Entity-Based Cross-Document Coreferencing Using the Vector Space Model
Cross-document coreference occurs when the same person, place, event, or concept is discussed in more than one text source. Computer recognition of this phenomenon is important be...
Amit Bagga, Breck Baldwin
ECIS
2004
13 years 9 months ago
Strategic Sourcing in Banking - A Framework
The banking landscape in Europe and Germany has a polypolistic market structure with an average vertical range of integration of 80%, implying high process redundancies. Accumulat...
Markus Lammers, Nils Loehndorf, Tim Weitzel
ICN
2007
Springer
14 years 2 months ago
Proxy-Based Visual Content Repurposing Using Selection Algorithm
– This paper presents a proxy-based visual content repurposing approach, which is used to repurpose visual content dynamically for the transmission over heterogeneous networks an...
M. Shamim Hossain, Abdulmotaleb El-Saddik
INFOCOM
2009
IEEE
14 years 2 months ago
Effective Delay Control in Online Network Coding
—Motivated by streaming applications with stringent delay constraints, we consider the design of online network coding algorithms with timely delivery guarantees. Assuming that t...
João Barros, Rui A. Costa, Daniele Munarett...