Sciweavers

2261 search results - page 16 / 453
» Dynamic types for authentication
Sort
View
ACSC
2004
IEEE
13 years 11 months ago
Strength Reduction for Loop-Invariant Types
Types are fundamental for enforcing levels of abstraction in modern high-level programming languages and their lower-level representations. However, some type-related features suc...
Phung Hua Nguyen, Jingling Xue
FLAIRS
2007
13 years 10 months ago
Discriminating between Second Language Learning Text-Types
Text classification remains one of the major fields of research in natural language processing. This paper evaluates the use of the computational tool Coh-Metrix as a means to dis...
Scott A. Crossley, Philip M. McCarthy, Danielle S....
IJON
2007
77views more  IJON 2007»
13 years 7 months ago
Reliability and stochastic synchronization in type I vs. type II neural oscillators
Neural reliability and stochastic synchronization are remarkable features of real neurons with important consequences for neural computation. Both phenomena are general properties...
Roberto Fdez. Galán, Bard Ermentrout, Natha...
IJNSEC
2007
145views more  IJNSEC 2007»
13 years 7 months ago
Authenticated Group Key Agreement Protocols for Ad hoc Wireless Networks
The lack of fixed infrastructure, both physical and organizational, and the highly dynamic nature of ad hoc networks, presents a major challenge in providing secure, authenticate...
Ahmed Abdel-Hafez, Ali Miri, Luis Orozco-Barbosa
ISCAPDCS
2003
13 years 9 months ago
Performance of a Jini-based Ad Hoc Network Authentication Scheme
Ad hoc networks provide a dynamically reconfigurable network infrastructure where entities can participate at will. Jini technology can be used to implement an ad hoc network, and...
M. M. McMahon, D. M. Needham, J. B. Datko